Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap

B Zolfaghari, T Koshiba - Applied System Innovation, 2022‏ - mdpi.com
Recently, many researchers have been interested in the application of chaos in
cryptography. Specifically, numerous research works have been focusing on chaotic image …

Image encryption algorithms: A survey of design and evaluation metrics

Y Alghamdi, A Munir - Journal of Cybersecurity and Privacy, 2024‏ - mdpi.com
Ensuring confidentiality and privacy is critical when it comes to sharing images over
unsecured networks such as the internet. Since widely used and secure encryption …

Secure surveillance system using chaotic image encryption technique

G Ghosh, S Verma, NZ Jhanjhi… - IOP conference series …, 2020‏ - iopscience.iop.org
In the current data transmission situation, digital images constitute a large part of visual
communication. Their security is thus an essential field of concern. This paper analyses …

Optical bit-plane-based 3D-JST cryptography algorithm with cascaded 2D-FrFT encryption for efficient and secure HEVC communication

W El-Shafai, IM Almomani, A Alkhayer - IEEE Access, 2021‏ - ieeexplore.ieee.org
The rapid growth of multimedia communication systems has expanded the High-Efficiency
Video Coding (HEVC) security applications precipitously. Therefore, there is an urgent …

Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm

W El-Shafai, FAHE Mohamed… - IEEE …, 2021‏ - ieeexplore.ieee.org
Various cancelable biometric techniques have been proposed to maintain user data
security. In this work, a cancelable biometric framework is introduced to satisfy user data …

Cybersecurity framework of hybrid watermarking and selective encryption for secure HEVC communication

OS Faragallah, W El-Shafai, AI Sallam, I Elashry… - Journal of Ambient …, 2022‏ - Springer
Recently, the digital multimedia cybersecurity has become a research topic of interest due to
the fast development of real-time multimedia applications over public networks such as the …

Traditional and deep-learning-based denoising methods for medical images

W El-Shafai, SA El-Nabi, AM Ali, ESM El-Rabaie… - Multimedia Tools and …, 2024‏ - Springer
Visual information is extremely important in today's world. Visual information transmitted in
the form of digital images has become a critical mode of communication. As a result, digital …

Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm

S Bhowmik, S Acharyya - Journal of Information Security and Applications, 2023‏ - Elsevier
Meta-heuristic techniques are widely used to solve different complex real-life problems in
recent scenarios. In this work, traditional key-generation mechanisms have been combined …

[HTML][HTML] A survey on security threats and countermeasures in IoT to achieve users confidentiality and reliability

KY Najmi, MA AlZain, M Masud, NZ Jhanjhi… - Materials Today …, 2023‏ - Elsevier
The idea of the Internet of Things that everything is linked to anything and everything
interacts with the other is a great idea, and that the topic of integrating these devices will add …

Proposed 3D chaos-based medical image cryptosystem for secure cloud-IoMT eHealth communication services

W El-Shafai, F Khallaf, ESM El-Rabaie… - Journal of Ambient …, 2024‏ - Springer
Medical image encryption is a mandatory process in various healthcare, Internet of Medical
Things (IoMT) and cloud services. This paper provides a robust cryptosystem based on a 3D …