Advances and vulnerabilities in modern cryptographic techniques: A comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum …

A Mehmood, A Shafique, M Alawida, AN Khan - IEEE Access, 2024 - ieeexplore.ieee.org
In the contemporary landscape, where a huge amount of data plays a vital role, the
importance of strong and robust cybersecurity measures has become increasingly …

Image encryption algorithms: A survey of design and evaluation metrics

Y Alghamdi, A Munir - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
Ensuring confidentiality and privacy is critical when it comes to sharing images over
unsecured networks such as the internet. Since widely used and secure encryption …

An image encryption algorithm based on Fibonacci Q-matrix and genetic algorithm

Z Liang, Q Qin, C Zhou - Neural Computing and Applications, 2022 - Springer
In this paper, an image encryption algorithm based on Fibonacci Q-matrix and genetic
algorithm is proposed. The new four-layer encryption framework of diffusion-scrambling …

Securing E‐Healthcare Images Using an Efficient Image Encryption Model

J Jain, A Jain - Scientific Programming, 2022 - Wiley Online Library
With the advancements in e‐healthcare services, it is possible to provide remote medical
services to patients and swifter first aid. Medical images play an essential role in e …

A novel image encryption scheme based on elliptic curves over finite rings

U Hayat, I Ullah, NA Azam, S Azhar - Entropy, 2022 - mdpi.com
Image encryption based on elliptic curves (ECs) is emerging as a new trend in cryptography
because it provides high security with a relatively smaller key size when compared with well …

A lightweight noise-tolerant encryption scheme for secure communication: An unmanned aerial vehicle application

A Shafique, A Mehmood, M Elhadef, KH Khan - PLoS One, 2022 - journals.plos.org
In the modern era, researchers have focused a great deal of effort on multimedia security
and fast processing to address computational processing time difficulties. Due to limited …

A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption

A Mehmood, A Shafique, SA Chaudhry… - Journal of Information …, 2023 - Elsevier
Due to the exponential rise of multimedia technologies, digital information privacy is now
more crucial than ever. The process of transmitting data across a channel such as the …

A plain-image correlative semi-selective medical image encryption algorithm using enhanced 2D-logistic map

B Zhang, B Rahmatullah, SL Wang, Z Liu - Multimedia Tools and …, 2023 - Springer
Modern medical examinations have produced a large number of medical images. It is a
great challenge to transmit and store them quickly and securely. Existing solutions mainly …

Deep learning and chaos: A combined approach to image encryption and decryption

BV Nair, SS Muni, A Durdu - arxiv preprint arxiv:2406.16792, 2024 - arxiv.org
In this paper, we introduce a novel image encryption and decryption algorithm using
hyperchaotic signals from the novel 3D hyperchaotic map, 2D memristor map, Convolutional …

Enhanced security in lossless audio encryption using zigzag scrambling, DNA coding, SHA-256, and Hopfield networks: a practical VLC system implementation

SBN Fotso, WN Atchoffo, AC Nzeukou… - Multimedia Tools and …, 2024 - Springer
This paper presents a novel lossless audio encryption algorithm based on a modified zigzag
scrambling technique, SHA-256, DNA coding, cipher block chaining (CBC) mode, and the …