A new encryption algorithm for image data based on two-way chaotic maps and iterative cellular automata

MA Alkhonaini, E Gemeay, FM Zeki Mahmood… - Scientific Reports, 2024‏ - nature.com
Due to their simplicity of implementation and compliance with the encryption issue, chaotic
models are often utilized in picture encryption applications. Despite having many benefits …

A Secure and Robust Autoencoder‐Based Perceptual Image Hashing for Image Authentication

AS Shaik, RK Karsh, M Islam… - … and Mobile Computing, 2022‏ - Wiley Online Library
With the advancement of technology, it has become easier to modify or tamper with digital
data effortlessly. In recent times, the image hashing algorithm has gained popularity for …

Image security retrieval based on chaotic algorithm and deep learning

Q Zhang, Y Yan, Y Lin, Y Li - IEEE Access, 2022‏ - ieeexplore.ieee.org
At present, most image retrieval methods are based on plain-text images which poses a
threat to some professional fields, such as medicine, military, and finance. In order to …

New optimized chaotic encryption with BCOVIDOA for efficient security of medical images in IoMT systems

YS Alsahafi, AM Khalid, HM Hamza… - Neural Computing and …, 2024‏ - Springer
Abstract The Internet of Medical Things systems involve medical data transmissions
between patients, medical experts, and medical centers over public networks. The sensitivity …

Innovative Transformation of S-Box Through Chaotic Map Using a Pragmatic Approach

AS Qazi, AH Zahid, A Baz, F Arslan, M Ali, J Ali - IEEE Access, 2024‏ - ieeexplore.ieee.org
In present-day data communication, the imperative to safeguard information and shield it
from a multitude of potential threats and attacks has gained significant prominence. One of …

Utilizing Chaotic Logistic Keys for LSB1 and LSB2 Message Steganography

AA Sharadqh, JS Alkasassbeh, TA Alawneh… - … , Technology & Applied …, 2024‏ - etasr.com
This paper introduces a novel hybrid data steganography method that combines the new
techniques of LSB1 and LSB2. The proposed method simplifies data-hiding and extraction …

[PDF][PDF] An Information Feedback-based Particle Swarm Optimization Algorithm for Multi-regional Image Segmentation

FQ Meng, S Wei, JD Wang, PF Wang, B Li - J. Netw. Intell, 2023‏ - bit.kuas.edu.tw
Multi-objective evolutionary algorithm (MOEA) is the most common algorithm in multi-
regional image segmentation. More objectives should consider the image qualities more …

[PDF][PDF] Digital Copyright Protection of Images Based on Invasive Weed Optimisation Algorithm

X Zhou, A Santos - 2024‏ - bit.kuas.edu.tw
Research on digital copyright protection for images provides digital media platforms and
social media with important tools to ensure that users do not infringe on the intellectual …

Enhancing the Present Block Cipher for IoT Applications: Development and Comparative Analysis of a Lightweight Algorithm with Improved Key Schedule Algorithm

M Imdad - 2023‏ - search.proquest.com
Abstract The Internet of Things (IoT) has massive connectivity of resource-constrained
devices, and enormous data exchange between devices has made it susceptible to various …

[PDF][PDF] Research Article A Secure and Robust Autoencoder-Based Perceptual Image Hashing for Image Authentication

AS Shaik, RK Karsh, M Islam, SP Singh - 2022‏ - academia.edu
With the advancement of technology, it has become easier to modify or tamper with digital
data effortlessly. In recent times, the image hashing algorithm has gained popularity for …