Results 11 to 20 of about 6,410,352 (379)

Image Encryption Algorithms: A Survey of Design and Evaluation Metrics

open access: yesJournal of Cybersecurity and Privacy
Ensuring confidentiality and privacy is critical when it comes to sharing images over unsecured networks such as the internet. Since widely used and secure encryption methods, such as AES, Twofish, and RSA, are not suitable for real-time image encryption
Yousef Alghamdi, Arslan Munir
doaj   +2 more sources

Chaos-Based Image Encryption: Review, Application, and Challenges

open access: yesMathematics, 2023
Chaos has been one of the most effective cryptographic sources since it was first used in image-encryption algorithms. This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symmetric
Bowen Zhang, Lingfeng Liu
doaj   +2 more sources

Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding

open access: yesMathematics, 2023
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map.
Shenli Zhu   +3 more
doaj   +2 more sources

Image Encryption Algorithm Combining Chaotic Image Encryption and Convolutional Neural Network

open access: yesElectronics, 2023
With the rapid development of information technology, the security of images has emerged as a significant area of research. This study presents an algorithm that integrates chaotic image encryption and a convolutional neural network (CNN) to enhance security and efficiency.
Luoyin Feng, Jize Du, Chong Fu, Wei Song
openaire   +2 more sources

Color Image Encryption Through Chaos and KAA Map

open access: yesIEEE Access, 2023
The unprecedented growth in production and exchange of multimedia over unsecured channels is overwhelming mathematicians, scientists and engineers to realize secure and efficient cryptographic algorithms. In this paper, a color image encryption algorithm
Wassim Alexan   +4 more
semanticscholar   +1 more source

Exploiting Newly Designed Fractional-Order 3D Lorenz Chaotic System and 2D Discrete Polynomial Hyper-Chaotic Map for High-Performance Multi-Image Encryption

open access: yesFractal and Fractional, 2023
Chaos-based image encryption has become a prominent area of research in recent years. In comparison to ordinary chaotic systems, fractional-order chaotic systems tend to have a greater number of control parameters and more complex dynamical ...
Wei Feng   +7 more
semanticscholar   +1 more source

Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs

open access: yesFractal and Fractional, 2023
Image encryption is increasingly becoming an important area of research in information security and network communications as digital images are widely used in various applications and are vulnerable to various types of attacks.
Wassim Alexan   +2 more
semanticscholar   +1 more source

Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption

open access: yesSymmetry, 2023
With the explosion of the generation, transmission and sharing of image data over the Internet and other unsecured networks, the need for and significance of the development of novel image encryption algorithms are unprecedented.
Wassim Alexan   +3 more
semanticscholar   +1 more source

Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz

open access: yesIEEE Access, 2020
In recent years, experts and scholars in the field of information security have attached great importance to the security of image information. They have proposed many image encryption algorithms with higher security.
Tao Li, Baoxiang Du, Xiaowen Liang
doaj   +1 more source

Chaotic image encryption using hopfield and hindmarsh–rose neurons implemented on FPGA [PDF]

open access: yes, 2020
Chaotic systems implemented by artificial neural networks are good candidates for data encryption. In this manner, this paper introduces the cryptographic application of the Hopfield and the Hindmarsh–Rose neurons.
Cruz-Vega, Israel   +7 more
core   +2 more sources

Home - About - Disclaimer - Privacy