Results 41 to 50 of about 85,913 (281)

Learnable Image Encryption [PDF]

open access: yes2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW), 2018
2 ...
openaire   +2 more sources

Research on wheat image encryption based on different chaotic systems

open access: yesSystems Science & Control Engineering
To study the influence of chaotic systems on wheat image encryption, a method to determine the optimal chaotic system encryption based on a wheat image is proposed.
Yi Shao   +3 more
doaj   +1 more source

A Plain-Image-Related Chaotic Image Encryption Algorithm Based on DNA Sequence Operation and Discrete Logarithm

open access: yesIEEE Access, 2019
According to the research works of the literatures on chaotic cryptanalysis, many recent chaotic image encryption algorithms cannot resist chosen-plaintext attack.
Wei Feng   +3 more
doaj   +1 more source

Chaos-Based Image Encryption: Review, Application, and Challenges

open access: yesMathematics, 2023
Chaos has been one of the most effective cryptographic sources since it was first used in image-encryption algorithms. This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symmetric
Bowen Zhang, Lingfeng Liu
doaj   +1 more source

Image Encryption Based on Diffusion and Multiple Chaotic Maps

open access: yes, 2011
In the recent world, security is a prime important issue, and encryption is one of the best alternative way to ensure security. More over, there are many image encryption schemes have been proposed, each one of them has its own strength and weakness ...
bagan, Dr. K. Bhoopathy   +2 more
core   +1 more source

A flexible and visually meaningful multi-image compression, encryption and hiding scheme based on 2D compressive sensing

open access: yesHeliyon, 2023
Background: Encrypting plain images into noise-like cipher images is a common method in image encryption. However, when noise-like images appear in public networks, they are more likely to attract attention and suffer more cryptanalysis.
Dongming Huo   +6 more
doaj   +1 more source

AES-CBC Software Execution Optimization

open access: yes, 2012
With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process.
Doma, Jayramsingh   +2 more
core   +1 more source

Breaking a novel colour image encryption algorithm based on chaos

open access: yes, 2012
Recently, a colour image encryption algorithm based on chaos was proposed by cascading two position permutation operations and one substitution operation, which are all determined by some pseudo-random number sequences generated by iterating the Logistic
Li, Chengqing   +4 more
core   +1 more source

Image Encryption Using a Lightweight Stream Encryption Algorithm [PDF]

open access: yesAdvances in Multimedia, 2012
Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and computer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a series of tests are performed to confirm suitability of the described encryption algorithm.
Saeed Bahrami, Majid Naderi
openaire   +2 more sources

Sirolimus for Extracranial Arteriovenous Malformations: A Scoping Review of the Evidence in Syndromic and Non‐Syndromic Cases

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Arteriovenous malformations (AVMs) are rare, high‐flow, vascular anomalies that can occur either sporadically or as part of a genetic syndrome. AVMs can progress with serious morbidity and even mortality if left unchecked. Sirolimus is an mTOR inhibitor that is effective in low‐flow vascular malformations; however, its role in AVMs is unclear.
Will Swansson   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy