Encryption by block based on rekeying and inter-intra pixel permutation

R Rimani, A Ali-Pacha, NH Said - International Journal of …, 2024 - inderscienceonline.com
The growing use of ICT exposes exchanges to certain risks, which require the existence of
adequate security measures of information. The data encryption is often an effective way to …

A new image encryption algorithm combining the meaning of location with output feedback mode

HM Elkamchouchi, MA Shawky… - 2018 10th …, 2018 - ieeexplore.ieee.org
Encryption is very essential to secure data in multimedia and communication systems. This
paper represents a new concept for image encryption using a new method based on the …

Image cryptography based on image processing technique and classification algorithm

MK Ibrahim, FT Mohammed - Journal of Algebraic Statistics, 2022 - publishoa.com
Data security is a set of means, actions and measures that we can take to protect our
information, whether internal or external, in order not to allow it to be hacked or to not allow …

[PDF][PDF] LHM filter for removal salt and pepper with random noise in images

VP Jhariya, RG Kashyap - International Journal of Computer …, 2016 - researchgate.net
In today's modern world, the image quality will be as good as the more information we can
get from that image as an image of a planet comes to us, we will clean the image quality as …

Iris biometric feature hidden based on chaotic encryption

W Jiao, H Zhang, Q Zang, J Zhang, H Li - Proceedings of the Conference …, 2019 - dl.acm.org
Iris verification is considered to be the safest method of biometric identification, but it has
been shown that iris features may be illegally used. In order to preserve the iris features and …

[PDF][PDF] Image encryption algorithm based on chaotic map** and Chinese remainder theorem.

C Yang, M Hua, S Jia - Metallurgical & Mining Industry, 2015 - metaljournal.com.ua
When the image data are regularly changed, existing image encryption algorithm is easy to
be decrypted. In order to improve the security of encryption algorithm, this paper proposes …

Bit-Level Image Encryption Algorithm Based on Composite Chaotic Map**

C Yang, H Zhang, J Guo, S Jia, F Li - International Journal of Signal …, 2016 - earticle.net
Because the single chaotic map** easily creates security weaknesses in the image
encryption algorithm, the security needs to be improved. Aiming at this problem, a bit-level …

[PDF][PDF] HYBRID DIGITAL SIGNATURE SCHEME

HA El-Taib - 2019 - researchgate.net
Transmitting data over unsecured Channels is one of the most indispensable issues which
motivate researchers to study. In this paper, a new hybrid digital signature approach is going …

[PDF][PDF] Authentication Mechanisms in Computer Network Protocols

MAS Ahmed - 2018 - researchgate.net
According to the fast progression of digital communication systems, information security
becomes indispensable in data exchange and storage. Sharing information and data over …

[PDF][PDF] Year of Publication: 2016

VP Jhariya, RG Kashyap - 2016 - academia.edu
In today's modern world, the image quality will be as good as the more information we can
get from that image as an image of a planet comes to us, we will clean the image quality as …