Results 21 to 30 of about 6,410,352 (379)

Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption

open access: yesEntropy, 2023
Over the past few years, chaotic image encryption has gained extensive attention. Nevertheless, the current studies on chaotic image encryption still possess certain constraints. To break these constraints, we initially created a two-dimensional enhanced
Hongmin Li   +7 more
semanticscholar   +1 more source

Image encryption scheme based on a controlled zigzag transform and bit-level encryption under the quantum walk

open access: yesFrontiers in Physics, 2023
With the rapid development of science and technology and network technology, the study of information security has become a hot spot, and image encryption has potential value in this regard.
Tian Zhang, Shumei Wang
doaj   +1 more source

Analytic Study of a Novel Color Image Encryption Method Based on the Chaos System and Color Codes

open access: yesComplexity, 2021
Due to the growing of the use of Internet and communication media, image encryption is rapidly increased. Image sharing through unsafe open channels is vulnerable for attacking and stealing.
Shamsa Kanwal   +5 more
doaj   +1 more source

An efficient image encryption algorithm based on S-box and DNA code

open access: yesMeasurement: Sensors, 2023
In order to ensure the security of image information transmission, a new image encryption algorithm is proposed based on S-box and DNA coding theory. Through the construction of the dynamic S-box, the key space of the encryption algorithm is enlarged ...
Jian Zhang, Jifeng Guo, Donglei Lu
doaj   +1 more source

A Chaotic Image Encryption Method Based on the Artificial Fish Swarms Algorithm and the DNA Coding

open access: yesMathematics, 2023
Aiming at the problems of small key space and weak resistance to differential attacks in existing encryption algorithms, we proposed a chaotic digital image encryption scheme based on an optimized artificial fish swarm algorithm and DNA coding.
Yuefei Zhu   +3 more
semanticscholar   +1 more source

Joint Lossless Image Compression and Encryption Scheme Based on CALIC and Hyperchaotic System

open access: yesEntropy, 2021
For efficiency and security of image transmission and storage, the joint image compression and encryption method that performs compression and encryption in a single step is a promising solution due to better security.
Miao Zhang   +3 more
doaj   +1 more source

AES Image Encryption (Advanced Encryption Standard)

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2021
Abstract: An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access.
openaire   +1 more source

Brain-Like Initial-Boosted Hyperchaos and Application in Biomedical Image Encryption

open access: yesIEEE Transactions on Industrial Informatics, 2022
Neural networks have been widely and deeply studied in the field of computational neurodynamics. However, coupled neural networks and their brain-like chaotic dynamics have not been noticed yet.
Hairong Lin   +5 more
semanticscholar   +1 more source

A Survey on Key(s) and Keyless Image Encryption Techniques

open access: yesCybernetics and Information Technologies, 2017
As in recent years digital data transmission and image application have been increasing, maintaining secure transmission of image is of high importance. Image Encryption is implemented to achieve security on image applications.
Ranjan Kumar H. S.   +3 more
doaj   +1 more source

A medical image encryption method based on chaos floating-point operation and its realization by FPGA

open access: yesDianzi Jishu Yingyong, 2023
Aiming at the high confidentiality requirement of medical image data transmission in the Internet, an encryption method based on Logistic chaotic floating point number operation is proposed for medical image encryption.
Pang Yu, Wei Dong, Wang Junchao
doaj   +1 more source

Home - About - Disclaimer - Privacy