A comparative review on non-chaotic and chaotic image encryption techniques

G Ghosh, D Anand, Kavita, S Verma, NZ Jhanjhi… - … and Innovation on Data …, 2021 - Springer
In the new era, multimedia technology is used extensively. Multimedia data transfers over
the Internet are not adequately stable. Data protection is needed for digital images transfer …

Assessment of hybrid cryptographic algorithm for secure sharing of textual and pictorial content

P William, A Choubey, GS Chhabra… - … on electronics and …, 2022 - ieeexplore.ieee.org
Nowadays, networks have become global in scope, and information has assumed a digital
shape. Due to the volume of data transmitted over the internet, data security has become a …

Secure framework enhancing AES algorithm in cloud computing

IA Awan, M Shiraz, MU Hashmi… - Security and …, 2020 - Wiley Online Library
The tremendous growth of computational clouds has attracted and enabled intensive
computation on resource‐constrained client devices. Predominantly, smart mobiles are …

[PDF][PDF] Securing Transmitted Color Images Using Zero Watermarking and Advanced Encryption Standard on Raspberry Pi.

DS Khafaga, SM Alhammad, A Magdi… - … Systems Science & …, 2023 - cdn.techscience.cn
Image authentication techniques have recently received a lot of attention for protecting
images against unauthorized access. Due to the wide use of the Internet nowadays, the …

[PDF][PDF] Hybrid cryptography with a one–time stamp to secure contact tracing for covid–19 infection

AAR El-Douh, SF Lu, AA Elkouny… - International Journal of …, 2022 - sciendo.com
The COVID-19 pandemic changed the lives of millions of citizens worldwide in the manner
they live and work to the so-called new norm in social standards. In addition to the …

Hybrid Cryptographic Approach: For Secure Data Communication using Block Cipher Techniques

A Gour, SS Malhi, G Singh, G Kaur - E3S Web of Conferences, 2024 - e3s-conferences.org
In our rapidly evolving digital age, where data is the lifeblood of businesses and individuals
alike, safeguarding sensitive information and ensuring secure communication channels has …

[PDF][PDF] Performance evaluation of hybrid cryptography algorithm for secure sharing of text & images

P Patil, R Bansode - International Research Journal of Engineering …, 2020 - academia.edu
Nowadays, the networks have gone global and information has taken the digital form. Since,
large amount of data transferred over the internet, data security becomes challenging issue …

A payload scrambling technique for secure image steganography

S Rathor, V Rawal, K Chhavi - Advances in Data and Information Sciences …, 2022 - Springer
Communication is the basic need of everyone. It may be in the form of text, image or video.
No one wants to public his/her message to everyone. Therefore, such a technique is …

A novel permutation based encryption using tree traversal approach

S Thangavelu, V Sonai, P Malaisamy… - Recent Advances in …, 2020 - ingentaconnect.com
Background: In 21st century one of the emerging issues is to secure the information stored
and communicated in digital form. There is no assurance that the data we have sent may be …

Performance of Secure Framework AES Algorithm using Cloud Computing

R Rani, RK Bathla - Journal of Scientific Research, 2024 - banglajol.info
The conventional advanced encryption standard (AES) method requires improvement to
accommodate modern security hazards in cloud computing. Outsourcing private and secret …