Articles with "image encryption" as a keyword



Photo by krakenimages from unsplash

A novel efficient image encryption scheme based on chained skew tent maps

Sign Up to like & get
recommendations!
Published in 2017 at "Neural Computing and Applications"

DOI: 10.1007/s00521-017-3199-x

Abstract: This work proposes an efficient and secure color and grayscale image encryption scheme that utilizes a chaining of skew tent maps as its pseudorandom number generator. The proposed scheme convolves the shuffling and mixing operations… read more here.

Keywords: scheme; skew tent; encryption scheme; image encryption ... See more keywords
Photo from wikipedia

Asymmetric image encryption using phase-truncated discrete multiple-parameter fractional Fourier transform

Sign Up to like & get
recommendations!
Published in 2018 at "Optical Review"

DOI: 10.1007/s10043-018-0464-x

Abstract: An asymmetric image encryption scheme is proposed using a phase-truncated discrete multiple-parameter fractional Fourier transform (DMPFRFT). After applying a pixel-scrambling operation and random-phase mask, an asymmetric ciphertext with stationary white noise can be obtained using… read more here.

Keywords: asymmetric image; phase; using phase; image encryption ... See more keywords
Photo from wikipedia

A new chaotic system with hidden attractor and its engineering applications: analog circuit realization and image encryption

Sign Up to like & get
recommendations!
Published in 2019 at "Analog Integrated Circuits and Signal Processing"

DOI: 10.1007/s10470-018-1252-z

Abstract: In this article a simple chaotic flow with hidden attractor is proposed. Various dynamics of this new system such as periodic and chaotic oscillations can be achieved by setting bifurcation parameters in a proper value.… read more here.

Keywords: image encryption; system; chaotic system; encryption ... See more keywords
Photo from wikipedia

Angular-Multiplexing Optical Multiple-Image Encryption Based on Digital Holography and Random Amplitude Mask

Sign Up to like & get
recommendations!
Published in 2017 at "Journal of Russian Laser Research"

DOI: 10.1007/s10946-017-9643-7

Abstract: We propose an improved optical image encryption scheme. By illuminating original images positioned in the input plane of the 4-f correlator and introducing reference waves with different incident angles in the output plane, we accomplish… read more here.

Keywords: image encryption; mask; random amplitude; multiple image ... See more keywords
Photo from wikipedia

A Novel Visual Medical Image Encryption for Secure Transmission of Authenticated Watermarked Medical Images

Sign Up to like & get
recommendations!
Published in 2021 at "Mobile Networks and Applications"

DOI: 10.1007/s11036-019-01213-x

Abstract: Secure medical data transmission is the important criteria in tele-medicine. It is helpful for getting the exact medical information at the remote specialist’s side from the local doctor. The medical image watermarking technique is used… read more here.

Keywords: medical image; image encryption; image; transmission ... See more keywords
Photo by kmuza from unsplash

Optimizing chaos based image encryption

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-5807-x

Abstract: Due to its inherent properties such as sensitivity to initial condition, ergodicity and systematic parametrization chaos systems have been extensively used in image encryption. However, one needs to optimize the chaos for each image being… read more here.

Keywords: based image; image encryption; image; encryption ... See more keywords
Photo by usgs from unsplash

Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6015-4

Abstract: In the recent literature, many research studies have proven that Known and Chosen plaintext attacks are very efficient tools that are widely used to cryptanalyze partially or completely some chaos-based and non-chaos cryptosystems. In this… read more here.

Keywords: image encryption; image; diffusion; scheme using ... See more keywords
Photo by robertbye from unsplash

Construction of a new 2D Chebyshev-Sine map and its application to color image encryption

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6996-z

Abstract: A new 2D Chebyshev-Sine map with natural evaluation is proposed and its dynamical behavior is analyzed. To investigate its application in information security, a color image encryption algorithm is designed. One-time initial condition expressed as… read more here.

Keywords: image encryption; chebyshev sine; new chebyshev; sine map ... See more keywords
Photo by nci from unsplash

Image encryption scheme based on Chaos and DNA plane operations

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-07794-9

Abstract: This paper proposes a novel image encryption algorithm based on chaos and DNA planes operations by utilizing one time pad. The plain image is firstly shuffled by means of “interweaving of ranks”. Next, we divided… read more here.

Keywords: image encryption; image; dna; chaos dna ... See more keywords
Photo from wikipedia

Image encryption based on Henon chaotic system with nonlinear term

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-08072-4

Abstract: Henon chaotic system is a kind of classical chaotic system which is widely studied and applied. However, when we analyze its chaotic characteristics, we can still find some shortcomings. In this paper, a Henon chaotic… read more here.

Keywords: chaotic system; image encryption; system; henon chaotic ... See more keywords
Photo from wikipedia

A new fast double-chaotic based Image encryption scheme

Sign Up to like & get
recommendations!
Published in 2019 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-019-08234-4

Abstract: In this paper, a new scheme for image encryption based on a double chaotic pseudo random generator (DCPG), simple XOR and shift rotations operations is proposed. The DCPG is a combination of both Tent and… read more here.

Keywords: image encryption; input image; image; double chaotic ... See more keywords