A comprehensive review on image encryption techniques

M Kaur, V Kumar - Archives of Computational Methods in Engineering, 2020 - Springer
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …

A novel color image encryption algorithm based on spatial permutation and quantum chaotic map

SM Seyedzadeh, B Norouzi, MR Mosavi… - Nonlinear …, 2015 - Springer
In recent years, several algorithms of secure image encryption were studied and developed
through chaotic processes. Most of the previous algorithms encrypt color components …

City sustainability evaluation using multi-criteria decision making with objective weights of interdependent criteria

L Zhang, Y Xu, CH Yeh, Y Liu, D Zhou - Journal of Cleaner Production, 2016 - Elsevier
City sustainability evaluation can be formulated as a multi-criteria decision making (MCDM)
problem where the interactions and weights of interdependent criteria cannot be subjectively …

New DNA coded fuzzy based (DNAFZ) S-boxes: Application to robust image encryption using hyper chaotic maps

AG Mohamed, NO Korany, SE El-Khamy - Ieee Access, 2021 - ieeexplore.ieee.org
This article proposes a novel approach of improvising the cryptographic features of
substitution-boxes (S-Box) based on the Choquet Fuzzy Integral (CFI) and DNA techniques …

A new fuzzy-DNA image encryption and steganography technique

SE El-Khamy, NO Korany, AG Mohamed - IEEE Access, 2020 - ieeexplore.ieee.org
Image encryption and steganography techniques are receiving a lot of interest and
investigations due to their high importance in multimedia communication systems. A novel …

A survey of image encryption for healthcare applications

Priyanka, AK Singh - Evolutionary Intelligence, 2023 - Springer
Recently, medical image encryption has attracted many researchers because of security
issues in the communication process. The recent COVID-19 has highlighted the fact that …

An image encryption algorithm based on DNA sequence operations and cellular neural network

B Norouzi, S Mirzakuchaki - Multimedia Tools and Applications, 2017 - Springer
This paper presents a new way of image encryption based on biologic DNA sequence
operations and Cellular Neural Network (CNN), which consists of three processes; bit …

[PDF][PDF] A technique to encrypt-decrypt stereo wave file

J Nadir, AA Ein, Z Alqadi - International Journal of Computer and …, 2016 - researchgate.net
Stereo wave files are now very popular type of data which transmitted and received through
the internet, thus this data transmission needs a highly secure method of sending and …

Aggregation functions considering criteria interrelationships in fuzzy multi-criteria decision making: state-of-the-art

L Sun, H Dong, AX Liu - IEEE Access, 2018 - ieeexplore.ieee.org
Aggregation function is an important component in an information aggregation or
information fusion system. Interrelationships usually exist between the input arguments (eg …

Jensen-type inequalities for Sugeno integral

S Abbaszadeh, ME Gordji, E Pap, A Szakal - Information Sciences, 2017 - Elsevier
In this paper, the classical Jensen inequalities for concave function φ, ie, φ (∫ f (x) d μ)⩾∫ φ
(f) d μ and φ (∑ i= 1 n λ ixi)⩾∑ i= 1 n λ i φ (xi), are adapted for the Sugeno integral using the …