A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations

F Masood, M Driss, W Boulila, J Ahmad… - Wireless personal …, 2022 - Springer
Medical images possess significant importance in diagnostics when it comes to healthcare
systems. These images contain confidential and sensitive information such as patients' X …

Chaos-based confusion and diffusion of image pixels using dynamic substitution

A Qayyum, J Ahmad, W Boulila, S Rubaiee… - IEEE …, 2020 - ieeexplore.ieee.org
The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise
to data sharing through the Internet. This data transfer via open public networks are …

DNA and plaintext dependent chaotic visual selective image encryption

JS Khan, W Boulila, J Ahmad, S Rubaiee… - IEEE …, 2020 - ieeexplore.ieee.org
Visual selective image encryption can both improve the efficiency of the image encryption
algorithm and reduce the frequency and severity of attacks against data. In this article, a new …

Efficient hashing method using 2D-2D PCA for image copy detection

X Liang, Z Tang, Z Huang, X Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Image copy detection is an important technology of copyright protection. This paper
proposes an efficient hashing method for image copy detection using 2D-2D (two-directional …

Dynamic substitution and confusion-diffusion-based noise-resistive image encryption using multiple chaotic maps

MU Rehman, A Shafique, S Khalid, I Hussain - IEEE Access, 2021 - ieeexplore.ieee.org
The advancement in wireless communication has encouraged the process of data
transferring through the Internet. The process of data sharing via the Internet is prone to …

[HTML][HTML] A novel privacy approach of digital aerial images based on mersenne twister method with DNA genetic encoding and chaos

F Masood, W Boulila, J Ahmad, Arshad, S Sankar… - Remote Sensing, 2020 - mdpi.com
Aerial photography involves capturing images from aircraft and other flying objects,
including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can …

[HTML][HTML] Designing two secure keyed hash functions based on sponge construction and the chaotic neural network

N Abdoun, S El Assad, T Manh Hoang, O Deforges… - Entropy, 2020 - mdpi.com
In this paper, we propose, implement, and analyze the structures of two keyed hash
functions using the Chaotic Neural Network (CNN). These structures are based on Sponge …

Integration of spatial and frequency domain encryption for digital images

A Shafique, MM Hazzazi, AR Alharbi, I Hussain - IEEE Access, 2021 - ieeexplore.ieee.org
Transmission of multimedia data such as images, videos, and audio over the Internet is risky
due to cyberattacks. To overcome the security issues, several encryption schemes are …

Enhancing the depth perception of DSA images with 2D–3D registration

X Zhang, Y Deng, C Tian, S Chen, Y Wang… - Frontiers in …, 2023 - frontiersin.org
Objective Today, cerebrovascular disease has become an important health hazard.
Therefore, it is necessary to perform a more accurate and less time-consuming registration …

[HTML][HTML] An image hashing-based authentication and secure group communication scheme for IoT-enabled MANETs

A Albeshri - Future Internet, 2021 - mdpi.com
Mobile ad hoc networks (MANETs) play a highly significant role in the Internet of Things (IoT)
for managing node mobility. MANET opens the pathway for different IoT-based …