Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (54)
  • Open Access

    ARTICLE

    Remote Sensing Image Encryption Using Optimal Key Generation-Based Chaotic Encryption

    Mesfer Al Duhayyim1,*, Fatma S. Alrayes2, Saud S. Alotaibi3, Sana Alazwari4, Nasser Allheeib5, Ayman Yafoz6, Raed Alsini6, Amira Sayed A. Aziz7

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3209-3223, 2023, DOI:10.32604/csse.2023.034185 - 03 April 2023

    Abstract The Internet of Things (IoT) offers a new era of connectivity, which goes beyond laptops and smart connected devices for connected vehicles, smart homes, smart cities, and connected healthcare. The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users. With the increasing use of multimedia in communications, the content security of remote-sensing images attracted much attention in academia and industry. Image encryption is important for securing remote sensing images in the IoT environment. Recently, researchers have introduced plenty of algorithms for encrypting images. This study introduces an Improved… More >

  • Open Access

    ARTICLE

    An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher

    Ghofran Kh. Shraida1, Hameed A. Younis1, Taief Alaa Al-Amiedy2, Mohammed Anbar2,*, Hussain A. Younis3,4, Iznan H. Hasbullah2

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2641-2654, 2023, DOI:10.32604/cmc.2023.035793 - 31 March 2023

    Abstract Nowadays, high-resolution images pose several challenges in the context of image encryption. The encryption of huge images’ file sizes requires high computational resources. Traditional encryption techniques like, Data Encryption Standard (DES), and Advanced Encryption Standard (AES) are not only inefficient, but also less secure. Due to characteristics of chaos theory, such as periodicity, sensitivity to initial conditions and control parameters, and unpredictability. Hence, the characteristics of deoxyribonucleic acid (DNA), such as vast parallelism and large storage capacity, make it a promising field. This paper presents an efficient color image encryption method utilizing DNA encoding with… More >

  • Open Access

    ARTICLE

    Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm

    Mohammed S. Alshehri1, Sultan Almakdi1,*, Mimonah Al Qathrady2, Jawad Ahmad3

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2401-2414, 2023, DOI:10.32604/csse.2023.036152 - 09 February 2023

    Abstract Chaos-based cryptosystems are considered a secure mode of communication due to their reliability. Chaotic maps are associated with the other domains to construct robust encryption algorithms. There exist numerous encryption schemes in the literature based on chaotic maps. This work aims to propose an attack on a recently proposed hyper-chaotic map-based cryptosystem. The core notion of the original algorithm was based on permutation and diffusion. A bit-level permutation approach was used to do the permutation row-and column-wise. The diffusion was executed in the forward and backward directions. The statistical strength of the cryptosystem has been… More >

  • Open Access

    ARTICLE

    A Novel Lightweight Image Encryption Scheme

    Rawia Abdulla Mohammed1,*, Maisa’a Abid Ali Khodher1, Ashwak Alabaichi2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2137-2153, 2023, DOI:10.32604/cmc.2023.036861 - 06 February 2023

    Abstract Encryption algorithms are one of the methods to protect data during its transmission through an unsafe transmission medium. But encryption methods need a lot of time during encryption and decryption, so it is necessary to find encryption algorithms that consume little time while preserving the security of the data. In this paper, more than one algorithm was combined to obtain high security with a short implementation time. A chaotic system, DNA computing, and Salsa20 were combined. A proposed 5D chaos system was used to generate more robust keys in a Salsa algorithm and DNA computing.… More >

  • Open Access

    ARTICLE

    A Cross-Plane Color Image Encryption Algorithm Based on 1D-SLM

    Xiaohong Wang, Huiqing Wu, Yuying Ma, Shuzhen Huang*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1093-1108, 2023, DOI:10.32604/csse.2023.036652 - 20 January 2023

    Abstract With the rapid development of 5G technology, it has become fast and easy for people to transmit information on the Internet. Digital images can express information more intuitively, so transmitting information through images has excellent applications. This paper uses a new chaotic system called 1D-Sin-Logistic-Map (1D-SLM). 1D-SLM has two control parameters, which can provide larger parameter space, and the parameter space in the chaotic state is continuous. Through Lyapunov exponent analysis (LE), bifurcation diagrams analysis, spectral entropy analysis (SE), and 0-1 test, it is verified that 1D-SLM has complex dynamic behavior and is very suitable More >

  • Open Access

    ARTICLE

    A Novel 2D Hyperchaotic with a Complex Dynamic Behavior for Color Image Encryption

    Yongsheng Hu*, Liyong Nan

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6555-6571, 2023, DOI:10.32604/cmc.2023.036090 - 28 December 2022

    Abstract The generation method of the key stream and the structure of the algorithm determine the security of the cryptosystem. The classical chaotic map has simple dynamic behavior and few control parameters, so it is not suitable for modern cryptography. In this paper, we design a new 2D hyperchaotic system called 2D simple structure and complex dynamic behavior map (2D-SSCDB). The 2D-SSCDB has a simple structure but has complex dynamic behavior. The Lyapunov exponent verifies that the 2D-SSCDB has hyperchaotic behavior, and the parameter space in the hyperchaotic state is extensive and continuous. Trajectory analysis and… More >

  • Open Access

    ARTICLE

    Improved Multileader Optimization with Shadow Encryption for Medical Images in IoT Environment

    Mesfer Al Duhayyim1,*, Mohammed Maray2, Ayman Qahmash2, Fatma S. Alrayes3, Nuha Alshuqayran4, Jaber S. Alzahrani5, Mohammed Alghamdi2,6, Abdullah Mohamed7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3133-3149, 2023, DOI:10.32604/cmc.2023.032740 - 31 October 2022

    Abstract Nowadays, security plays an important role in Internet of Things (IoT) environment especially in medical services’ domains like disease prediction and medical data storage. In healthcare sector, huge volumes of data are generated on a daily basis, owing to the involvement of advanced health care devices. In general terms, health care images are highly sensitive to alterations due to which any modifications in its content can result in faulty diagnosis. At the same time, it is also significant to maintain the delicate contents of health care images during reconstruction stage. Therefore, an encryption system is… More >

  • Open Access

    ARTICLE

    An Efficient Encryption and Compression of Sensed IoT Medical Images Using Auto-Encoder

    Passent El-kafrawy1,2, Maie Aboghazalah2,*, Abdelmoty M. Ahmed3, Hanaa Torkey4, Ayman El-Sayed4

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 909-926, 2023, DOI:10.32604/cmes.2022.021713 - 31 August 2022

    Abstract Healthcare systems nowadays depend on IoT sensors for sending data over the internet as a common practice. Encryption of medical images is very important to secure patient information. Encrypting these images consumes a lot of time on edge computing; therefore, the use of an auto-encoder for compression before encoding will solve such a problem. In this paper, we use an auto-encoder to compress a medical image before encryption, and an encryption output (vector) is sent out over the network. On the other hand, a decoder was used to reproduce the original image back after the… More >

  • Open Access

    ARTICLE

    VLSI Implementation of Optimized 2D SIMM Chaotic Map for Image Encryption

    M. Sundar Prakash Balaji1,*, V. R. Vijaykumar2, Kamalraj Subramaniam3, M. Kannan4, V. Ayyem Pillai5

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3155-3168, 2023, DOI:10.32604/iasc.2023.028969 - 17 August 2022

    Abstract The current research work proposed a novel optimization-based 2D-SIMM (Two-Dimensional Sine Iterative chaotic map with infinite collapse Modulation Map) model for image encryption. The proposed 2D-SIMM model is derived out of sine map and Iterative Chaotic Map with Infinite Collapse (ICMIC). In this technique, scrambling effect is achieved with the help of Chaotic Shift Transform (CST). Chaotic Shift Transform is used to change the value of pixels in the input image while the substituted value is cyclically shifted according to the chaotic sequence generated by 2D-SIMM model. These chaotic sequences, generated using 2D-SIMM model, are More >

  • Open Access

    ARTICLE

    Wind Driven Optimization-Based Medical Image Encryption for Blockchain-Enabled Internet of Things Environment

    C. S. S. Anupama1, Raed Alsini2, N. Supriya3, E. Laxmi Lydia4, Seifedine Kadry5, Sang-Soo Yeo6, Yongsung Kim7,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3219-3233, 2022, DOI:10.32604/cmc.2022.030267 - 16 June 2022

    Abstract Internet of Things (IoT) and blockchain receive significant interest owing to their applicability in different application areas such as healthcare, finance, transportation, etc. Medical image security and privacy become a critical part of the healthcare sector where digital images and related patient details are communicated over the public networks. This paper presents a new wind driven optimization algorithm based medical image encryption (WDOA-MIE) technique for blockchain enabled IoT environments. The WDOA-MIE model involves three major processes namely data collection, image encryption, optimal key generation, and data transmission. Initially, the medical images were captured from the… More >

Displaying 21-30 on page 3 of 54. Per Page