|
|
|
Behrouz Zolfaghari and Takeshi Koshiba
Recently, many researchers have been interested in the application of chaos in cryptography. Specifically, numerous research works have been focusing on chaotic image encryption. A comprehensive survey can highlight existing trends and shed light on less...
ver más
|
|
|
|
|
|
|
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi...
ver más
|
|
|
|
|
|
|
Dani Elias Mfungo, Xianping Fu, Xingyuan Wang and Yongjin Xian
In today?s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines the Kronecker xor pr...
ver más
|
|
|
|
|
|
|
Moatsum Alawida, Je Sen Teh and Wafa? Hamdan Alshoura
Drone-based surveillance has become widespread due to its flexibility and ability to access hazardous areas, particularly in industrial complexes. As digital camera capabilities improve, more visual information can be stored in high-resolution images, re...
ver más
|
|
|
|
|
|
|
Hongming Li, Lilai Zhang, Hao Cao and Yirui Wu
Deoxyribonucleic Acid (DNA) computing has demonstrated great potential in data encryption due to its capability of parallel computation, minimal storage requirement, and unbreakable cryptography. Focusing on high-dimensional image data for encryption wit...
ver más
|
|
|
|
|
|
|
Fatma S. Alrayes, Saud S. Alotaibi, Khalid A. Alissa, Mashael Maashi, Areej Alhogail, Najm Alotaibi, Heba Mohsen and Abdelwahed Motwakel
Unmanned Aerial Vehicles (UAVs), or drones, provided with camera sensors enable improved situational awareness of several emergency responses and disaster management applications, as they can function from remote and complex accessing regions. The UAVs c...
ver más
|
|
|
|
|
|
|
Ibrahim Abunadi, Hanan Abdullah Mengash, Saud S. Alotaibi, Mashael M. Asiri, Manar Ahmed Hamza, Abu Sarwar Zamani, Abdelwahed Motwakel and Ishfaq Yaseen
Recent developments of semiconductor and communication technologies have resulted in the interconnection of numerous devices in offering seamless communication and services, which is termed as Internet of Everything (IoE). It is a subset of Internet of T...
ver más
|
|
|
|
|
|
|
Hala A. Naman,Naseer Ali Hussien,Mohand Lokman Al-dabag,Haider Th.Salim Alrikabi
Pág. pp. 172 - 183
One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion ...
ver más
|
|
|
|
|
|
|
Chih-Hsueh Lin, Guo-Hsin Hu, Che-Yu Chan and Jun-Juh Yan
|
|
|
|
|
|
|
Haotian Liang, Guidong Zhang, Wenjin Hou, Pinyi Huang, Bo Liu and Shouliang Li
Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic curve ...
ver más
|
|
|
|
|
|
|
Hanmeng Wu, Jun Wang, Ziyi Zhang, Xudong Chen and Zheng Zhu
A multi-image encryption with super-large-capacity is proposed by using spherical diffraction and filtering diffusion. In the proposed method, initial images are processed sequentially by filtering diffusion and chaos scrambling. The images are combined ...
ver más
|
|
|
|
|
|
|
Yuqiang Dou and Ming Li
Security of image communication is more and more important in many applications such as the transmission of military and medical images. To meet the requirement, a new color image encryption algorithm using a new one-dimension (1D) chaotic map was propos...
ver más
|
|
|
|
|
|
|
Isabel Amaya Barrera, César Augusto Suárez Parra, Daniel Santos Bustos
ResumenDescargasReferenciasCómo citar
|
|
|
|
|
|
|
Terlumun Gbaden, Blama Nachaba
Pág. Page:1 - 14Abstract
|
|
|
|
|
|
|
Li-Lian Huang, Shi-Ming Wang and Jian-Hong Xiang
Since the proposed scheme can efficiently perform image encryption, it can be applied to real-time communication, such as telemedicine.
|
|
|
|
|
|
|
Dandan Liu, Jian Shen, Zhihua Xia and Xingming Sun
Content-based image retrieval (CBIR) has been widely used in many applications. Large storage and computation overheads have made the outsourcing of CBIR services attractive. However, the privacy issues brought by outsourcing have become a big problem. I...
ver más
|
|
|
|
|
|
|
Arun Kumar Rai, Hari Om, Satish Chand and Chia-Chen Lin
In today?s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this, reversible dat...
ver más
|
|
|
|
|
|
|
Neng Zhou, Minqing Zhang, Han Wang, Mengmeng Liu, Yan Ke and Xu An Wang
To combine homomorphic public key encryption with reversible data hiding, a reversible data hiding scheme in homomorphic encrypted image based on EC-EG is proposed. Firstly, the cover image is segmented. The square grid pixel group randomly selected by t...
ver más
|
|
|
|
|
|
|
Ammar Odeh, Anas Abu Taleb, Tareq Alhajahjeh and Francisco Navarro
Securing medical imaging poses a significant challenge in preserving the confidentiality of healthcare data. Numerous research efforts have focused on fortifying these images, with encryption emerging as a primary solution for maintaining data integrity ...
ver más
|
|
|
|
|
|
|
Hang Chen, Zhengjun Liu, Camel Tanougast and Jie Ding
An encryption algorithm for hyperspectral data in fractional Fourier domain is designed. Firstly, the original hyperspectral image is separated into single bands and then each pair of bands are regarded as the real and imaginary part of a complex functio...
ver más
|
|
|
|