A versatile chaotic cryptosystem with a novel substitution-permutation scheme for internet-of-drones photography
Despite getting slighter in weights and smaller in sizes, camera-bearing UAVs are
extensively used in countless applications. This has posed significant safety and security …
extensively used in countless applications. This has posed significant safety and security …
An efficient grayscale image encryption scheme based on variable length row-column swap** operations
Swap** a row with a row, a column with a column or row with a column are usual
operations carried out to scramble the given input plain image. To introduce more …
operations carried out to scramble the given input plain image. To introduce more …
Z-Crypt: Chirp Z-Transform-Based Image Encryption Leveraging Chaotic Logistic Maps and Substitution Permutation Network
In the current era of digital communication, image security is a top priority as sending
images, which often contain personal or confidential information, over the Internet poses …
images, which often contain personal or confidential information, over the Internet poses …
Reconfigurable architecture for image encryption using a three-layer artificial neural network
M Devipriya, M Sreenivasan… - IETE Journal of Research, 2024 - Taylor & Francis
Multimedia security is important as privacy and protection has to be ensured when images
from military, medical and other confidential services are sent through the unprotected …
from military, medical and other confidential services are sent through the unprotected …
Combinatorial Cryptography and Latin Squares
In this chapter, we first overview the applications of combinatorics in cryptography. Then, we
take look at some historical applications of non-combinatorial squares and cubes in …
take look at some historical applications of non-combinatorial squares and cubes in …
[LIVRE][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach
B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …
secure cryptosystem guarantees that the malicious third party cannot guess anything …
A novel and efficient method based on knight moves for securing the information contents of images—A parallel approach
Protection of multimedia information from unauthorized access demands a mechanism that
provides security. In addition, securing the information contents in less time is a challenging …
provides security. In addition, securing the information contents in less time is a challenging …
Robustness analysis of a hyperchaos-based digital image encryption algorithm under noise attacks
Images are susceptible to degradation by noise from different sources as they undergo
various processes. The effect of noise degradation affects the visual information fidelity …
various processes. The effect of noise degradation affects the visual information fidelity …
[PDF][PDF] A New Image Encryption Algorithm Based on Six Dimension Hyper Chaotic System and KEN KEN Puzzle
Image encryption is the process of hiding the real form of an image, its goal is to protect the
confidentiality of digital image information that is sent over public networks. This paper …
confidentiality of digital image information that is sent over public networks. This paper …
Perfect Secrecy in IoT
B Zolfaghari, K Bibak - Springer
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly
secure cryptosystem guarantees that the malicious third party cannot guess anything …
secure cryptosystem guarantees that the malicious third party cannot guess anything …