Advances and vulnerabilities in modern cryptographic techniques: A comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum …
In the contemporary landscape, where a huge amount of data plays a vital role, the
importance of strong and robust cybersecurity measures has become increasingly …
importance of strong and robust cybersecurity measures has become increasingly …
Image encryption algorithms: A survey of design and evaluation metrics
Ensuring confidentiality and privacy is critical when it comes to sharing images over
unsecured networks such as the internet. Since widely used and secure encryption …
unsecured networks such as the internet. Since widely used and secure encryption …
An image encryption algorithm based on Fibonacci Q-matrix and genetic algorithm
Z Liang, Q Qin, C Zhou - Neural Computing and Applications, 2022 - Springer
In this paper, an image encryption algorithm based on Fibonacci Q-matrix and genetic
algorithm is proposed. The new four-layer encryption framework of diffusion-scrambling …
algorithm is proposed. The new four-layer encryption framework of diffusion-scrambling …
Securing E‐Healthcare Images Using an Efficient Image Encryption Model
With the advancements in e‐healthcare services, it is possible to provide remote medical
services to patients and swifter first aid. Medical images play an essential role in e …
services to patients and swifter first aid. Medical images play an essential role in e …
A novel image encryption scheme based on elliptic curves over finite rings
Image encryption based on elliptic curves (ECs) is emerging as a new trend in cryptography
because it provides high security with a relatively smaller key size when compared with well …
because it provides high security with a relatively smaller key size when compared with well …
A lightweight noise-tolerant encryption scheme for secure communication: An unmanned aerial vehicle application
In the modern era, researchers have focused a great deal of effort on multimedia security
and fast processing to address computational processing time difficulties. Due to limited …
and fast processing to address computational processing time difficulties. Due to limited …
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption
Due to the exponential rise of multimedia technologies, digital information privacy is now
more crucial than ever. The process of transmitting data across a channel such as the …
more crucial than ever. The process of transmitting data across a channel such as the …
A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map
Modern medical examinations have produced a large number of medical images. It is a
great challenge to transmit and store them quickly and securely. Existing solutions mainly …
great challenge to transmit and store them quickly and securely. Existing solutions mainly …
Deep learning and chaos: A combined approach to image encryption and decryption
In this paper, we introduce a novel image encryption and decryption algorithm using
hyperchaotic signals from the novel 3D hyperchaotic map, 2D memristor map, Convolutional …
hyperchaotic signals from the novel 3D hyperchaotic map, 2D memristor map, Convolutional …
Enhanced security in lossless audio encryption using zigzag scrambling, DNA coding, SHA-256, and Hopfield networks: a practical VLC system implementation
This paper presents a novel lossless audio encryption algorithm based on a modified zigzag
scrambling technique, SHA-256, DNA coding, cipher block chaining (CBC) mode, and the …
scrambling technique, SHA-256, DNA coding, cipher block chaining (CBC) mode, and the …