Results 41 to 50 of about 85,913 (281)
Learnable Image Encryption [PDF]
2 ...
openaire +2 more sources
Research on wheat image encryption based on different chaotic systems
To study the influence of chaotic systems on wheat image encryption, a method to determine the optimal chaotic system encryption based on a wheat image is proposed.
Yi Shao +3 more
doaj +1 more source
According to the research works of the literatures on chaotic cryptanalysis, many recent chaotic image encryption algorithms cannot resist chosen-plaintext attack.
Wei Feng +3 more
doaj +1 more source
Chaos-Based Image Encryption: Review, Application, and Challenges
Chaos has been one of the most effective cryptographic sources since it was first used in image-encryption algorithms. This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symmetric
Bowen Zhang, Lingfeng Liu
doaj +1 more source
Image Encryption Based on Diffusion and Multiple Chaotic Maps
In the recent world, security is a prime important issue, and encryption is one of the best alternative way to ensure security. More over, there are many image encryption schemes have been proposed, each one of them has its own strength and weakness ...
bagan, Dr. K. Bhoopathy +2 more
core +1 more source
Background: Encrypting plain images into noise-like cipher images is a common method in image encryption. However, when noise-like images appear in public networks, they are more likely to attract attention and suffer more cryptanalysis.
Dongming Huo +6 more
doaj +1 more source
AES-CBC Software Execution Optimization
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh +2 more
core +1 more source
Breaking a novel colour image encryption algorithm based on chaos
Recently, a colour image encryption algorithm based on chaos was proposed by cascading two position permutation operations and one substitution operation, which are all determined by some pseudo-random number sequences generated by iterating the Logistic
Li, Chengqing +4 more
core +1 more source
Image Encryption Using a Lightweight Stream Encryption Algorithm [PDF]
Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm.
Saeed Bahrami, Majid Naderi
openaire +2 more sources
ABSTRACT Arteriovenous malformations (AVMs) are rare, high‐flow, vascular anomalies that can occur either sporadically or as part of a genetic syndrome. AVMs can progress with serious morbidity and even mortality if left unchecked. Sirolimus is an mTOR inhibitor that is effective in low‐flow vascular malformations; however, its role in AVMs is unclear.
Will Swansson +3 more
wiley +1 more source

