Quo vadis artificial intelligence?

Y Jiang, X Li, H Luo, S Yin, O Kaynak - Discover Artificial Intelligence, 2022 - Springer
The study of artificial intelligence (AI) has been a continuous endeavor of scientists and
engineers for over 65 years. The simple contention is that human-created machines can do …

Review of quantum image processing

Z Wang, M Xu, Y Zhang - Archives of Computational Methods in …, 2022 - Springer
As an interdisciplinary between quantum computing and image processing, quantum image
processing provides more possibilities for image processing due to the powerful parallel …

When an attacker meets a cipher-image in 2018: A year in review

C Li, Y Zhang, EY **e - Journal of Information Security and Applications, 2019 - Elsevier
This paper aims to review the encountered technical contradictions when an attacker meets
the cipher-images encrypted by the image encryption schemes (algorithms) proposed in …

An efficient image encryption scheme based on S-boxes and fractional-order differential logistic map

YQ Zhang, JL Hao, XY Wang - Ieee Access, 2020 - ieeexplore.ieee.org
In this work, an efficient image encryption based on S-boxes and fractional-order logistic
map is proposed. The features of the fractional-order chaotic system in dynamical behaviors …

Quantum image encryption scheme based on 2d s ine 2-l ogistic chaotic map

M Hu, J Li, X Di - Nonlinear Dynamics, 2023 - Springer
In recent years, quantum computing has made breakthrough progress. Due to the
characteristics of qubits, image processing may be made more efficient and secure using …

Cryptanalysis of novel image encryption scheme based on multiple chaotic substitution boxes

AS Alanazi, N Munir, M Khan, M Asif, I Hussain - IEEE Access, 2021 - ieeexplore.ieee.org
In current years many chaos-based Substitution boxes (S-boxes) have been proposed.
Recently, an image encryption technique based on multiple chaotic S-box was offered. This …

Efficient image encryption based on new substitution box using DNA coding and bent function

HAMA Basha, ASS Mohra, TOM Diab… - IEEE Access, 2022 - ieeexplore.ieee.org
This study contributes to creating an unbreakable S-Box based on a strong bent function
expanded by DNA sequences and investigates and analyzes the strength of the proposed S …

An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component

A Alghafis, N Munir, M Khan - Multimedia Tools and Applications, 2021 - Springer
In this research article, we have proposed a novel image encryption scheme for the
confidentiality of digital information. The modern block ciphers based on confusion and …

A novel image encryption scheme based on Arnold scrambling and Lucas series

SI Batool, HM Waseem - Multimedia tools and applications, 2019 - Springer
Secure data transmission over the public channels have high impact and increasingly
important due to theft and manipulation in contents. The requirement of public/private …

An encryption scheme based on discrete quantum map and continuous chaotic system

A Alghafis, N Munir, M Khan, I Hussain - International Journal of theoretical …, 2020 - Springer
Chaotic encryption is a growing field for competently shielding visual data. As well as
quantum encryption and substitution also play a significant role in applied fields owing to its …