A versatile chaotic cryptosystem with a novel substitution-permutation scheme for internet-of-drones photography

HE Mohamadi, L Lahlou, N Kara, A Leivadeas - Nonlinear Dynamics, 2024 - Springer
Despite getting slighter in weights and smaller in sizes, camera-bearing UAVs are
extensively used in countless applications. This has posed significant safety and security …

An efficient grayscale image encryption scheme based on variable length row-column swap** operations

N Iqbal, M Hanif - Multimedia Tools and Applications, 2021 - Springer
Swap** a row with a row, a column with a column or row with a column are usual
operations carried out to scramble the given input plain image. To introduce more …

Z-Crypt: Chirp Z-Transform-Based Image Encryption Leveraging Chaotic Logistic Maps and Substitution Permutation Network

A Alaklabi, A Munir, MA Hafeez, MAK Khattak - IEEE Access, 2024 - ieeexplore.ieee.org
In the current era of digital communication, image security is a top priority as sending
images, which often contain personal or confidential information, over the Internet poses …

Reconfigurable architecture for image encryption using a three-layer artificial neural network

M Devipriya, M Sreenivasan… - IETE Journal of Research, 2024 - Taylor & Francis
Multimedia security is important as privacy and protection has to be ensured when images
from military, medical and other confidential services are sent through the unprotected …

Combinatorial Cryptography and Latin Squares

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
In this chapter, we first overview the applications of combinatorics in cryptography. Then, we
take look at some historical applications of non-combinatorial squares and cubes in …

[LIVRE][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

A novel and efficient method based on knight moves for securing the information contents of images—A parallel approach

J Kumar, S Nirmala - Journal of information security and applications, 2016 - Elsevier
Protection of multimedia information from unauthorized access demands a mechanism that
provides security. In addition, securing the information contents in less time is a challenging …

Robustness analysis of a hyperchaos-based digital image encryption algorithm under noise attacks

EA Umoh, ON Iloanusi - … Journal of Engineering Research in Africa, 2019 - Trans Tech Publ
Images are susceptible to degradation by noise from different sources as they undergo
various processes. The effect of noise degradation affects the visual information fidelity …

[PDF][PDF] A New Image Encryption Algorithm Based on Six Dimension Hyper Chaotic System and KEN KEN Puzzle

A Kadhim, S Mehdi - Journal of Optoelectronics Laser, 2022 - researchgate.net
Image encryption is the process of hiding the real form of an image, its goal is to protect the
confidentiality of digital image information that is sent over public networks. This paper …

Perfect Secrecy in IoT

B Zolfaghari, K Bibak - Springer
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly
secure cryptosystem guarantees that the malicious third party cannot guess anything …