Results 71 to 80 of about 6,410,352 (379)

A flexible and visually meaningful multi-image compression, encryption and hiding scheme based on 2D compressive sensing

open access: yesHeliyon, 2023
Background: Encrypting plain images into noise-like cipher images is a common method in image encryption. However, when noise-like images appear in public networks, they are more likely to attract attention and suffer more cryptanalysis.
Dongming Huo   +6 more
doaj   +1 more source

Breaking a novel colour image encryption algorithm based on chaos

open access: yes, 2012
Recently, a colour image encryption algorithm based on chaos was proposed by cascading two position permutation operations and one substitution operation, which are all determined by some pseudo-random number sequences generated by iterating the Logistic
Li, Chengqing   +4 more
core   +1 more source

Space-based optical image encryption

open access: yesOptics Express, 2010
In this paper, we propose a new method based on a three-dimensional (3D) space-based strategy for the optical image encryption. The two-dimensional (2D) processing of a plaintext in the conventional optical encryption methods is extended to a 3D space-based processing.
Chen, W., Chen, X.
openaire   +2 more sources

Image encryption scheme based on improved four-dimensional chaotic system and evolutionary operators

open access: yesScientific Reports
To enhance the security of image data transmission, and address the weaknesses of existing image encryption schemes based on chaotic systems, particularly concerning resistance to differential attacks and the unstable performance of chaotic systems, this
Ying Niu, Hangyu Zhou, Xuncai Zhang
semanticscholar   +1 more source

A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations

open access: yesWireless personal communications, 2021
Medical images possess significant importance in diagnostics when it comes to healthcare systems. These images contain confidential and sensitive information such as patients’ X-rays, ultrasounds, computed tomography scans, brain images, and magnetic ...
Fawad Masood   +7 more
semanticscholar   +1 more source

A Cre‐dependent lentiviral vector for neuron subtype‐specific expression of large proteins

open access: yesFEBS Letters, EarlyView.
We designed a versatile and modular lentivector comprising a Cre‐dependent switch and self‐cleaving 2A peptide and tested it for co‐expression of GFP and a 2.8 kb gene of interest (GOI) in mouse cortical parvalbumin (PV+) interneurons and midbrain dopamine (TH+) neurons.
Weixuan Xue   +6 more
wiley   +1 more source

A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the AES Algorithm [PDF]

open access: yes, 2012
In recent years, several encryption algorithms have been proposed to protect digital images from cryptographic attacks. These encryption algorithms typically use a relatively small key space and therefore, provide safe, especially if they are of a ...
Abugharsa, Ahmed Bashir   +2 more
core   +1 more source

Multiplexing of encrypted data using fractal masks

open access: yes, 2012
This paper was published in OPTICS LETTERS and is made available as an electronic reprint with the permission of OSA. The paper can be found at the following URL on the OSA website: http://dx.doi.org/10.1364/OL.37.002895.
Barrera   +20 more
core   +1 more source

Quantum image encryption algorithm based on four-dimensional chaos

open access: yesFrontiers of Physics
Background: Quantum image processing is rapidly developing in the field of quantum computing, and it can be successfully implemented on the Noisy Intermediate-Scale Quantum (NISQ) device.
Xiao-Dong Liu   +6 more
semanticscholar   +1 more source

By dawn or dusk—how circadian timing rewrites bacterial infection outcomes

open access: yesFEBS Letters, EarlyView.
The circadian clock shapes immune function, yet its influence on infection outcomes is only beginning to be understood. This review highlights how circadian timing alters host responses to the bacterial pathogens Salmonella enterica, Listeria monocytogenes, and Streptococcus pneumoniae revealing that the effectiveness of immune defense depends not only
Devons Mo   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy