Journal articles on the topic 'Image Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Image Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Pourasad, Yaghoub, Ramin Ranjbarzadeh, and Abbas Mardani. "A New Algorithm for Digital Image Encryption Based on Chaos Theory." Entropy 23, no. 3 (March 13, 2021): 341. http://dx.doi.org/10.3390/e23030341.
Full textAlslman, Yasmeen, Eman Alnagi, Ashraf Ahmad, Yousef AbuHour, Remah Younisse, and Qasem Abu Al-haija. "Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard." Electronics 11, no. 23 (November 30, 2022): 3967. http://dx.doi.org/10.3390/electronics11233967.
Full textRamanathan, Thirumalaimuthu, Md Jakir Hossen, Md Shohel Sayeed, and Joseph Emerson Raja. "Survey on computational intelligence based image encryption techniques." Indonesian Journal of Electrical Engineering and Computer Science 19, no. 3 (September 1, 2020): 1428. http://dx.doi.org/10.11591/ijeecs.v19.i3.pp1428-1435.
Full textWang, Pengfei, Yixu Wang, Jiafu Xiang, and Xiaoling Xiao. "Fast Image Encryption Algorithm for Logistics-Sine-Cosine Mapping." Sensors 22, no. 24 (December 16, 2022): 9929. http://dx.doi.org/10.3390/s22249929.
Full textKovalchuk, A. M., Yuriy Peleckh, and Tetiana Bubela. "BIT OPERATIONS WITH ELEMENTS OF THE RSA ALGORITHM IN ENCRYPTION-DECRYPTION OF COLOR IMAGES." Measuring Equipment and Metrology 83, no. 3 (2022): 5–10. http://dx.doi.org/10.23939/istcmtm2022.03.005.
Full textHuang, Yongzhong, Xueguang Bi, Yucheng Liu, and Yuxia Li. "Development of a Novel Hyperchaos-Based Image Encryption Algorithm Consisting of Two Scrambling-Diffusion Operations." Complexity 2022 (October 4, 2022): 1–15. http://dx.doi.org/10.1155/2022/8765268.
Full textWu, Junfeng, Jialu Zhang, Dong Liu, and Xiaofeng Wang. "A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding." Entropy 25, no. 6 (June 3, 2023): 898. http://dx.doi.org/10.3390/e25060898.
Full textKouadra, Imane, Mehamal Bouchra, Tewfik Bekkouche, and Lahcene Ziet. "Encryption face area in color images using Chaotic Maps." International Conference on Pioneer and Innovative Studies 1 (June 13, 2023): 501–6. http://dx.doi.org/10.59287/icpis.880.
Full textAbeer Salim Jamil, Raghad Abdulaali Azeez, and Nidaa Flaih Hassan. "An Image Feature Extraction to Generate a Key for Encryption in Cyber Security Medical Environments." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 01 (January 17, 2023): 93–106. http://dx.doi.org/10.3991/ijoe.v19i01.36901.
Full textKumari, Abinaya, B. Akshaya, B. Umamaheswari, K. Thenmozhi, Rengarajan Amirtharajan, and Padmapriya Praveenkumar. "3D Lorenz Map Governs DNA Rule in Encrypting DICOM Images." Biomedical and Pharmacology Journal 11, no. 2 (June 26, 2018): 897–906. http://dx.doi.org/10.13005/bpj/1446.
Full textAlzain, Mohammed. "Chaos Baker-based Image Encryption in Operation Modes." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 17, no. 1 (January 16, 2018): 7153–63. http://dx.doi.org/10.24297/ijct.v17i1.7328.
Full textZhang, Jian, and Yutong Zhang. "An Image Encryption Algorithm Based on Balanced Pixel and Chaotic Map." Mathematical Problems in Engineering 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/216048.
Full textA. Rashid, Abdullah, and Khalid A. Hussein. "Image encryption algorithm based on the density and 6D logistic map." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 2 (April 1, 2023): 1903. http://dx.doi.org/10.11591/ijece.v13i2.pp1903-1913.
Full textSusanto, Arief, Tutik Khotimah, Muhammad Taufik Sumadi, Joko Warsito, and Rihartanto . "Image encryption using vigenere cipher with bit circular shift." International Journal of Engineering & Technology 7, no. 2.2 (March 5, 2018): 62. http://dx.doi.org/10.14419/ijet.v7i2.2.12734.
Full textISMAIL, I. A., A. A. ABDO, M. AMIN, and H. DIAB. "SELF-ADAPTIVE IMAGE ENCRYPTION BASED ON MEMORY CELLULAR AUTOMATA." International Journal of Information Acquisition 08, no. 03 (September 2011): 227–41. http://dx.doi.org/10.1142/s0219878911002434.
Full textG. B, Suresh, and V. Mathivanan. "Chaos Based Image Encryption." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 1 (January 1, 2018): 97. http://dx.doi.org/10.11591/ijeecs.v9.i1.pp97-100.
Full textIbrahim, Dina, Kareem Ahmed, Mohamed Abdallah, and AbdElmgeid A. Ali. "A New Chaotic-Based RGB Image Encryption Technique Using a Nonlinear Rotational 16 × 16 DNA Playfair Matrix." Cryptography 6, no. 2 (June 8, 2022): 28. http://dx.doi.org/10.3390/cryptography6020028.
Full textJang, Wonyoung, and Sun-Young Lee. "Partial image encryption using format-preserving encryption in image processing systems for Internet of things environment." International Journal of Distributed Sensor Networks 16, no. 3 (March 2020): 155014772091477. http://dx.doi.org/10.1177/1550147720914779.
Full textSatrasupalli, Sivaji, and S. Vishnu. "An Encryption Algorithm for Enhanced Image Security." International Journal of Engineering and Advanced Technology 9, no. 1s5 (December 30, 2019): 81–84. http://dx.doi.org/10.35940/ijeat.a1020.1291s519.
Full textHassan, Abass. "Image Encryption." International Journal for Research in Applied Science and Engineering Technology V, no. X (October 30, 2017): 2029–33. http://dx.doi.org/10.22214/ijraset.2017.10296.
Full textPraveenkum, Padmapriya, R. Hemalatha, R. Uma, K. Madhunisha, K. Thenmozhi, and Rengarajan Amirtharaj. "Image Encryption." Research Journal of Information Technology 6, no. 4 (April 1, 2014): 368–78. http://dx.doi.org/10.3923/rjit.2014.368.378.
Full textNori, Ahmed S., and Ansam O. Abdulmajeed. "Design and implementation of Threefish cipher algorithm in PNG file." Sustainable Engineering and Innovation 3, no. 2 (May 29, 2021): 79–91. http://dx.doi.org/10.37868/sei.v3i2.id131.
Full textYu, Wanbo, and Hao Wang. "Analysis of trigonometric chaotic sequence by proposing an index-based bit level scrambling image encryption." Modern Physics Letters B 35, no. 24 (July 8, 2021): 2150406. http://dx.doi.org/10.1142/s0217984921504066.
Full textHosny, Khalid M., Sara T. Kamal, Mohamed M. Darwish, and George A. Papakostas. "New Image Encryption Algorithm Using Hyperchaotic System and Fibonacci Q-Matrix." Electronics 10, no. 9 (April 30, 2021): 1066. http://dx.doi.org/10.3390/electronics10091066.
Full textZhang, Shijie, Lingfeng Liu, and Hongyue Xiang. "A Novel Plain-Text Related Image Encryption Algorithm Based on LB Compound Chaotic Map." Mathematics 9, no. 21 (November 2, 2021): 2778. http://dx.doi.org/10.3390/math9212778.
Full textYang, Ming, Monica Trifas, Guillermo Francia III, and Lei Chen. "Cryptographic and Steganographic Approaches to Ensure Multimedia Information Security and Privacy." International Journal of Information Security and Privacy 3, no. 3 (July 2009): 37–54. http://dx.doi.org/10.4018/jisp.2009100703.
Full textIbrahim, Dyala, Rami Sihwail, Khairul Akram Zainol Arrifin, Ala Abuthawabeh, and Manar Mizher. "A Novel Color Visual Cryptography Approach Based on Harris Hawks Optimization Algorithm." Symmetry 15, no. 7 (June 24, 2023): 1305. http://dx.doi.org/10.3390/sym15071305.
Full textFeng, Luoyin, Jize Du, Chong Fu, and Wei Song. "Image Encryption Algorithm Combining Chaotic Image Encryption and Convolutional Neural Network." Electronics 12, no. 16 (August 15, 2023): 3455. http://dx.doi.org/10.3390/electronics12163455.
Full textHussein, Sabreen Ali, Aseel Hamoud Hamza, Suhad Al-Shoukry, Musaddak Maher Abdul Zahra, Ali Saleem Abu Nouwar, Sarah Ali Abdulkareem, Mohammed Hasan Ali, and Mustafa Musa Jaber. "Evaluating image encryption algorithms for the hyperchaotic system and fibonacci q-matrix, secure internet of things, and advanced encryption standard." Eastern-European Journal of Enterprise Technologies 5, no. 2(119) (October 30, 2022): 21–30. http://dx.doi.org/10.15587/1729-4061.2022.265862.
Full textLi, Xiaowu, Chuying Yu, and Junfeng Guo. "Multi-Image Encryption Method via Computational Integral Imaging Algorithm." Entropy 24, no. 7 (July 18, 2022): 996. http://dx.doi.org/10.3390/e24070996.
Full textYongjun, Kong, Zhang Minqing, Wang Zexi, Ke Yan, and Huang Siyuan. "Reversible Data Hiding in Encrypted Domain Based on the Error-Correction Redundancy of Encryption Process." Security and Communication Networks 2022 (May 12, 2022): 1–17. http://dx.doi.org/10.1155/2022/6299469.
Full textRatan, Ram, and Arvind Yadav. "Security Analysis of Bit plane Level Image Encryption Schemes." Defence Science Journal 71, no. 2 (March 10, 2021): 209–21. http://dx.doi.org/10.14429/dsj.71.15643.
Full textWade, Sahil. "Description of Image encryption Using AES-256 bits." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 7167–71. http://dx.doi.org/10.22214/ijraset.2023.53365.
Full textFadhel, Sabah, Mohd Shafry, and Omar Farook. "Chaos Image Encryption Methods: A Survey Study." Bulletin of Electrical Engineering and Informatics 6, no. 1 (March 1, 2017): 99–104. http://dx.doi.org/10.11591/eei.v6i1.599.
Full textShao, Yu. "Image encryption algorithm for torsional components of generator based on compound chaotic model." Thermal Science 24, no. 3 Part A (2020): 1473–80. http://dx.doi.org/10.2298/tsci190717078s.
Full textChen, Jinlin, Yiquan Wu, Yeguo Sun, and Chunzhi Yang. "Image Encryption Algorithm Using 2-Order Bit Compass Coding and Chaotic Mapping." Symmetry 14, no. 7 (July 20, 2022): 1482. http://dx.doi.org/10.3390/sym14071482.
Full textDong, Jie, Guowei Wu, Tingting Yang, and Yangyang Li. "The Improved Image Scrambling Algorithm for the Wireless Image Transmission Systems of UAVs." Sensors 18, no. 10 (October 12, 2018): 3430. http://dx.doi.org/10.3390/s18103430.
Full textSridevi, P., and J. Suguna. "Image Encryption Using Arnold Map." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 70–73. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1954.
Full textShah, Jalpa, and J. S. Dhobi. "Chaos Based Image Encryption Technique." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 2289–91. http://dx.doi.org/10.31142/ijtsrd12733.
Full textJumaa, Noor. "Digital Image Encryption using AES and Random Number Generator." Iraqi Journal for Electrical and Electronic Engineering 14, no. 1 (June 1, 2018): 80–89. http://dx.doi.org/10.37917/ijeee.14.1.8.
Full textKaur, Mandeep, Surender Singh, and Manjit Kaur. "Computational Image Encryption Techniques: A Comprehensive Review." Mathematical Problems in Engineering 2021 (July 19, 2021): 1–17. http://dx.doi.org/10.1155/2021/5012496.
Full textM. Shafiq Surameery, Nigar. "Modified Advanced Encryption Standard for Boost Image Encryption." UHD Journal of Science and Technology 6, no. 1 (April 27, 2022): 52–59. http://dx.doi.org/10.21928/uhdjst.v6n1y2022.pp52-59.
Full textRevanna, C. R., and C. Keshavamurthy. "A new partial image encryption method for document images using variance based quad tree decomposition." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 1 (February 1, 2020): 786. http://dx.doi.org/10.11591/ijece.v10i1.pp786-800.
Full textGaur, Paavni. "AES Image Encryption (Advanced Encryption Standard)." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1357–63. http://dx.doi.org/10.22214/ijraset.2021.39542.
Full textS. Radke, Shashikant, and Dhirendra S. Mishra. "Review of Image Security approaches: Concepts, Issues, Challenges and Applications." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 17, 2021): 1047–54. http://dx.doi.org/10.51201/jusst/21/05378.
Full textAbeer Salim Jamil and Abdul Monem S. Rahma. "Cyber Security for Medical Image Encryption using Circular Blockchain Technology Based on Modify DES Algorithm." International Journal of Online and Biomedical Engineering (iJOE) 19, no. 03 (March 14, 2023): 99–112. http://dx.doi.org/10.3991/ijoe.v19i03.37569.
Full textManiyath, Shima Ramesh, and Thanikaiselvan V. "A novel efficient multiple encryption algorithm for real time images." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (April 1, 2020): 1327. http://dx.doi.org/10.11591/ijece.v10i2.pp1327-1336.
Full textDawood, Alyaa, Qabeela Thabit, and Taqwa Fahad. "A Comprehensive Review of Color Image Encryption Technology." Basrah journal for engineering science 23, no. 1 (July 2, 2023): 56–63. http://dx.doi.org/10.33971/bjes.23.1.8.
Full textKanwal, Shamsa, Saba Inam, Omar Cheikhrouhou, Kinza Mahnoor, Atef Zaguia, and Habib Hamam. "Analytic Study of a Novel Color Image Encryption Method Based on the Chaos System and Color Codes." Complexity 2021 (June 2, 2021): 1–19. http://dx.doi.org/10.1155/2021/5499538.
Full textSundararaman, R., H. N. Upadhyay, A. Sridevi, R. Sivaraman, V. Anand, T. Srinivasan, and S. Savithri. "Cellular Automata with Synthetic Image A Secure Image Communication with Transform Domain." Defence Science Journal 69, no. 3 (April 30, 2019): 259–65. http://dx.doi.org/10.14429/dsj.69.14422.
Full text