A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A novel image encryption algorithm based on chaotic sequences and cross-diffusion of bits
2020
IEEE Photonics Journal
To protect image information security, we propose an encryption algorithm based on chaotic sequences and bits' cross-diffusion. ...
Secondly, the scrambled image is transformed into a one-dimensional sequence, and the low-order bits between every two pixels are fused to change the detailed information of the image, improved the ability ...
Chai [23] proposed an image encryption algorithm based on Brownian motion, the bit pixels in each bit plane are used as Brownian motion particles to scramble the 8-bit planes of ordinary images, and ...
doi:10.1109/jphot.2020.3044222
fatcat:ulpu7mp73vh4vefxlsg4smitwu
A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations
2021
Wireless personal communications
In this work, we propose a lightweight cryptosystem based on Henon chaotic map, Brownian motion, and Chen's chaotic system to encrypt medical images with elevated security. ...
The experimental results show that the proposed cryptosystem is a lightweight approach that can achieve the desired security level for encrypting confidential image-based patients' information. ...
An enhanced image encryption scheme is proposed that combines chaos theory with Brownian motion (BM) and Chen's chaotic system (CCS) to achieve the desired level of security in storage systems of hospitals ...
doi:10.1007/s11277-021-08584-z
fatcat:r6elxupxlnapdmunh7l4bu42ti
When an attacker meets a cipher-image in 2018: A Year in Review
[article]
2019
arXiv
pre-print
The challenging problems on design and analysis of image encryption schemes are summarized to receive the attentions of both designers and attackers (cryptanalysts) of image encryption schemes, which may ...
This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of ...
DCIE follows the structure of PTDWOS and uses 3-D Brownian motion, a 3-D autonomous chaotic system and 2D-LASM as PRNG to control its basic components. ...
arXiv:1903.11764v2
fatcat:uoun46alavexflmuvcbtlinlqm
An image encryption algorithm based on bisection method and one-dimensional piecewise chaotic map
2021
IEEE Access
In this article, an image encryption algorithm via bisection method and one-dimensional piecewise chaotic map is proposed. It depends on the permutation-substitution model. ...
Bit-wise XOR operation with a mask generated from the Tent chaotic map is applied on shuffled image to increase the protection of the proposed algorithm. ...
[5] suggested an image encryption algorithm based on 1D chaotic tent map. A new 1D chaotic map based on Beta function created in [6] and used in the image encryption scheme. ...
doi:10.1109/access.2021.3065810
fatcat:gmox3hovpbgqffoxyh3exsoswy
A Comprehensive Review About Image Encryption Methods
2022
Harran Üniversitesi Mühendislik Dergisi
Studies on both colored and gray level images have been handled together. ...
In this study, 131 articles were examined and image encryption methods were classified according to the traditional methods, some new methods or combinations of some methods, that they contain. ...
A hyper-chaotic system and chaotic control parameters based robust hybrid image encryption algorithm is proposed in [41] . ...
doi:10.46578/humder.1066545
fatcat:uoq5vxftergjbp74ssrrdcwyn4
Color Image Encryption with a Novel Technique and Chaotic Singer Map
2021
Science Journal of University of Zakho
In the fourth stage, the logical XOR operator is applied to encrypt the image based on the three matrix and secret keys. ...
One of the extreme efficient, important, and necessary means used to preserve the information and contents of the image through sending it over the Internet or network communication is image encryption ...
2] Gan Z, Chai X, Zhang M, Lu Y (2018), "A double color image encryption scheme based on three-dimensional brownian motion". ...
doi:10.25271/sjuoz.2021.9.3.816
fatcat:cy63xzda6zeczphww7dou2zfha
Applicable Image Security Based on New Hyperchaotic System
2021
Symmetry
The new system combined with two-dimensional Logistic-Sine Coupling Mapping (2D-LSCM) is further applied to an image encryption application. ...
Symmetric keys are generated during this operation, which can be applied to the proposed image encryption and decryption algorithms. ...
Therefore, a new symmetric image encryption algorithm based on this system is proposed in the paper. ...
doi:10.3390/sym13122290
fatcat:xquej7pl2jb2xhkph3pa6f3ta4
A New Digital Image Encryption Algorithm Based on Improved Logistic Mapping and Josephus Circle
2018
Journal of Computer and Communications
Digital image encryption based on Joseph circle and Chaotic system has become a hot spot in the research of image encryption. ...
An encryption algorithm based on improved Josephus loop and logistic mapping is proposed to scrambling blocks in this paper. ...
[17] proposed an image encryption algorithm based on Brownian motion and image, and introduced a new one-dimensional chaotic system. ...
doi:10.4236/jcc.2018.66003
fatcat:nadoor43mfg6dpkebqrnzp7r3m
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map
2022
Complexity
In this work, a secure image encryption scheme is proposed using linear feedback shift register (LFSR) and chaos-based quantum chaotic map. ...
Such a solution relies on chaos encryption algorithms over standard cryptographic methods that possess multistage encryption levels, including high speed, high security, low compute overheads, and procedural ...
Acknowledgments One of the authors, Sajjad Shaukat Jamal, extends his gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through a research group program under ...
doi:10.1155/2022/7047282
fatcat:xjfm5hevn5dstjt7mhlu6vemli
A Secure and Lightweight Chaos Based Image Encryption Scheme
2022
Computers Materials & Continua
In this paper, we present an image encryption scheme based on the multi-stage chaos-based image encryption algorithm. The method works on the principle of confusion and diffusion. ...
Through the obtained random sequence, three layers of plain image are encrypted. Finally, with each encrypted layer, Brownian Particles (BP) are XORed that added an extra layer of security. ...
Tinkerbell Chaotic Map (TBCM) Tinkerbell chaotic map is a two-dimensional chaotic system based on discrete time. ...
doi:10.32604/cmc.2022.028789
fatcat:ih44sb3nzfe2jbd6nkdtf6fara
Parallel and Practical Approach of Efficient Image Chaotic Encryption Based on Message Passing Interface (MPI)
2022
Entropy
Encrypting pictures quickly and securely is required to secure image transmission over the internet and local networks. ...
This may be accomplished by employing a chaotic scheme with ideal properties such as unpredictability and non-periodicity. ...
[29] suggested a lightweight cryptosystem to encrypt medical pictures with enhanced security based on a Henon chaotic map, Brownian motion, and Chen's chaotic system. ...
doi:10.3390/e24040566
pmid:35455229
pmcid:PMC9025433
fatcat:dmwzlsybozh55lytxmaicadzcm
A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion
2018
Entropy
To obtain high security and efficiency, a simple chaotic based color image encryption system by using both plaintext related permutation and diffusion is presented in this paper. ...
key that needs to be sent to the receiver is determined by the original image, so these algorithms may not applicable to real-time image encryption; (3) most plaintext related image encryption schemes ...
The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, and in the decision to publish the results. ...
doi:10.3390/e20070535
pmid:33265624
fatcat:u66kznm74jgzdebp7gx6rxoe3e
MID-Crypt: A Cryptographic Algorithm for Advanced Medical Images Protection
2022
Journal of Sensor and Actuator Networks
'Medical images' is one such example of highly demanding security and privacy standards. ...
Privacy-preserving of medical information (such as medical records and images) is an essential right for patients to ensure security against undesired access parties. ...
Also, Chen and Hu [8] have proposed an adaptive encryption algorithm for medical images based on the enhanced chaotic mapping. ...
doi:10.3390/jsan11020024
fatcat:acic56reefgovffltssri4o6ya
2D-SCMCI hyperchaotic map for image encryption algorithm
2021
IEEE Access
For the image encryption algorithm using chaotic maps, their security mainly depends on the complexity of chaotic system. ...
Ever since an image encryption algorithm by 2D chaotic map was first designed by Fridrich [15] , researchers have introduced various image encryption algorithms through chaotic system [16] - [35] . ...
In addition, using 2D-SCMCI hyperchaotic map, we designed an image encryption algorithm, and security of the proposed encryption algorithm is analyzed. ...
doi:10.1109/access.2021.3070350
fatcat:42xtlfgx3jeojahr6ygjli2o3q
A novel image encryption scheme based on Kepler's third law and random Hadamard transform
2017
Chinese Physics B
In this paper, a novel image encryption scheme based on Kepler's third law and random Hadamard transform is proposed to ensure the security of a digital image. ...
In the end, the permuted image presents interweaving diffusion based on two special matrices, which are constructed by Kepler periodic sequence and chaos system. ...
[19] a novel image encryption algorithm based on three-dimensional (3D) Brownian motion and chaotic systems was presented to overcome the limitation of movement range of bits. ...
doi:10.1088/1674-1056/26/12/120504
fatcat:li26v63pqzftjkxcz7eagndlkq
« Previous
Showing results 1 — 15 out of 49 results