[HTML][HTML] Enhancement of the cast block algorithm based on novel S-box for image encryption

RS Ali, OZ Akif, SA Jassim, AK Farhan, ESM El-Kenawy… - Sensors, 2022 - mdpi.com
Background and Aim: due to the rapid growth of data communication and multimedia system
applications, security becomes a critical issue in the communication and storage of images …

An image encryption scheme based on a new hybrid chaotic map and optimized substitution box

MAB Farah, A Farah, T Farah - Nonlinear Dynamics, 2020 - Springer
This paper proposes a new hybrid chaotic map and a different way of using optimization
technique to improve the performance of encryption algorithms. Compared to other chaotic …

A new n-dimensional conservative chaos based on Generalized Hamiltonian System and its' applications in image encryption

X Liu, X Tong, Z Wang, M Zhang - Chaos, Solitons & Fractals, 2022 - Elsevier
In view of the problem that dissipative chaos has attractors and is easy to be attacked by
reconstruction, which leads to the security defects of encryption algorithm based on …

Designing a 2D infinite collapse map for image encryption

W Cao, Y Mao, Y Zhou - Signal Processing, 2020 - Elsevier
Due to the unpredictability and complexity properties, chaotic maps are widely applied in
security, communication, and system control. Existing one-dimensional (1D) chaotic maps …

Deterministic chaos game: a new fractal based pseudo-random number generator and its cryptographic application

P Ayubi, S Setayeshi, AM Rahmani - Journal of Information Security and …, 2020 - Elsevier
In this paper, a digital image encryption algorithm is proposed based on the generalized
model of the chaos game. The chaos game is a well-known fractal, which acts as a pseudo …

Efficient image encryption scheme using Henon map, dynamic S-boxes and elliptic curve cryptography

S Ibrahim, A Alharbi - IEEE Access, 2020 - ieeexplore.ieee.org
Image encryption schemes can be vulnerable to a variety of cryptanalysis attacks. The use of
key-dependent dynamic S-boxes has been shown to improve security. Threats of chosen …

An asymmetric image encryption scheme based on hash SHA-3, RSA and compressive sensing

Z Chen, G Ye - Optik, 2022 - Elsevier
Objective In order to avoid the unauthorized access to private images and make a secure
communication, an asymmetric image encryption algorithm based on SHA-3 and …

A novel image encryption system merging fractional-order edge detection and generalized chaotic maps

SM Ismail, LA Said, AG Radwan, AH Madian… - Signal Processing, 2020 - Elsevier
This paper presents a novel lossless image encryption algorithm based on edge detection
and generalized chaotic maps for key generation. Generalized chaotic maps, including the …

Efficient dynamic S-box generation using linear trigonometric transformation for security applications

AH Zahid, M Ahmad, A Alkhayyat, MT Hassan… - IEEE …, 2021 - ieeexplore.ieee.org
Protection of data transmitted over the network from illegal access is one of the major
challenges being posed by exponential growth of data in online digital communication …

Particle swarm optimization based highly nonlinear substitution-boxes generation for security applications

M Ahmad, IA Khaja, A Baz, H Alhakami… - IEEE Access, 2020 - ieeexplore.ieee.org
Symmetric encryption has been considered as one of the essential means of ensuring
security of end to end communication. The robustness and strength of modern day block …