Results 71 to 80 of about 6,410,352 (379)
Background: Encrypting plain images into noise-like cipher images is a common method in image encryption. However, when noise-like images appear in public networks, they are more likely to attract attention and suffer more cryptanalysis.
Dongming Huo +6 more
doaj +1 more source
Breaking a novel colour image encryption algorithm based on chaos
Recently, a colour image encryption algorithm based on chaos was proposed by cascading two position permutation operations and one substitution operation, which are all determined by some pseudo-random number sequences generated by iterating the Logistic
Li, Chengqing +4 more
core +1 more source
Space-based optical image encryption
In this paper, we propose a new method based on a three-dimensional (3D) space-based strategy for the optical image encryption. The two-dimensional (2D) processing of a plaintext in the conventional optical encryption methods is extended to a 3D space-based processing.
Chen, W., Chen, X.
openaire +2 more sources
Image encryption scheme based on improved four-dimensional chaotic system and evolutionary operators
To enhance the security of image data transmission, and address the weaknesses of existing image encryption schemes based on chaotic systems, particularly concerning resistance to differential attacks and the unstable performance of chaotic systems, this
Ying Niu, Hangyu Zhou, Xuncai Zhang
semanticscholar +1 more source
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations
Medical images possess significant importance in diagnostics when it comes to healthcare systems. These images contain confidential and sensitive information such as patients’ X-rays, ultrasounds, computed tomography scans, brain images, and magnetic ...
Fawad Masood +7 more
semanticscholar +1 more source
A Cre‐dependent lentiviral vector for neuron subtype‐specific expression of large proteins
We designed a versatile and modular lentivector comprising a Cre‐dependent switch and self‐cleaving 2A peptide and tested it for co‐expression of GFP and a 2.8 kb gene of interest (GOI) in mouse cortical parvalbumin (PV+) interneurons and midbrain dopamine (TH+) neurons.
Weixuan Xue +6 more
wiley +1 more source
A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the AES Algorithm [PDF]
In recent years, several encryption algorithms have been proposed to protect digital images from cryptographic attacks. These encryption algorithms typically use a relatively small key space and therefore, provide safe, especially if they are of a ...
Abugharsa, Ahmed Bashir +2 more
core +1 more source
Multiplexing of encrypted data using fractal masks
This paper was published in OPTICS LETTERS and is made available as an electronic reprint with the permission of OSA. The paper can be found at the following URL on the OSA website: http://dx.doi.org/10.1364/OL.37.002895.
Barrera +20 more
core +1 more source
Quantum image encryption algorithm based on four-dimensional chaos
Background: Quantum image processing is rapidly developing in the field of quantum computing, and it can be successfully implemented on the Noisy Intermediate-Scale Quantum (NISQ) device.
Xiao-Dong Liu +6 more
semanticscholar +1 more source
By dawn or dusk—how circadian timing rewrites bacterial infection outcomes
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo +2 more
wiley +1 more source

