Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …
cryptography. Specifically, numerous research works have been focusing on chaotic image …
Image encryption algorithms: A survey of design and evaluation metrics
Ensuring confidentiality and privacy is critical when it comes to sharing images over
unsecured networks such as the internet. Since widely used and secure encryption …
unsecured networks such as the internet. Since widely used and secure encryption …
Secure surveillance system using chaotic image encryption technique
In the current data transmission situation, digital images constitute a large part of visual
communication. Their security is thus an essential field of concern. This paper analyses …
communication. Their security is thus an essential field of concern. This paper analyses …
Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication
The rapid growth of multimedia communication systems has expanded the High-Efficiency
Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent …
Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent …
Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm
Various cancelable biometric techniques have been proposed to maintain user data
security. In this work, a cancelable biometric framework is introduced to satisfy user data …
security. In this work, a cancelable biometric framework is introduced to satisfy user data …
Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication
Recently, the digital multimedia cybersecurity has become a research topic of interest due to
the fast development of real-time multimedia applications over public networks such as the …
the fast development of real-time multimedia applications over public networks such as the …
Traditional and deep-learning-based denoising methods for medical images
Visual information is extremely important in today's world. Visual information transmitted in
the form of digital images has become a critical mode of communication. As a result, digital …
the form of digital images has become a critical mode of communication. As a result, digital …
Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm
S Bhowmik, S Acharyya - Journal of Information Security and Applications, 2023 - Elsevier
Meta-heuristic techniques are widely used to solve different complex real-life problems in
recent scenarios. In this work, traditional key-generation mechanisms have been combined …
recent scenarios. In this work, traditional key-generation mechanisms have been combined …
[HTML][HTML] A survey on security threats and countermeasures in IoT to achieve users confidentiality and reliability
The idea of the Internet of Things that everything is linked to anything and everything
interacts with the other is a great idea, and that the topic of integrating these devices will add …
interacts with the other is a great idea, and that the topic of integrating these devices will add …
Proposed 3D chaos-based medical image cryptosystem for secure cloud-IoMT eHealth communication services
Medical image encryption is a mandatory process in various healthcare, Internet of Medical
Things (IoMT) and cloud services. This paper provides a robust cryptosystem based on a 3D …
Things (IoMT) and cloud services. This paper provides a robust cryptosystem based on a 3D …