Search alternatives:
image » images (Expand Search)
Showing 81 - 100 results of 261 for search 'attack image analysis', query time: 0.11s Refine Results
  1. 81

    An Image Encryption Scheme Based on DNA Computing and Cellular Automata by Shihua Zhou, Bin Wang, Xuedong Zheng, Changjun Zhou

    Published 2016-01-01
    “…The results of a simulation experiment, performance analysis, and comparison to other encryption algorithms showed this algorithm to be capable of resisting brute force attacks, statistical attacks, and differential attacks. …”
    Get full text
    Article
  2. 82

    Image Encryption-Then-Transmission Using DNA Encryption Algorithm and The Double Chaos by Xing-Quan Fu, Bo-Cheng Liu, Yi-Yuan Xie, Wei Li, Yong Liu

    Published 2018-01-01
    “…The simulation results verify that the cryptosystem is enough against the traditional attacks, such as statistical attack, differential attack, brute force attack, and entropy attack. …”
    Get full text
    Article
  3. 83

    Two-Layer Security for Image Encryption: A Switched System Approach by Uyen L. P. Nguyen, Long Tonthat, Vo-Tan Phuoc, Lap Luat Nguyen

    Published 2025-01-01
    “…Finally, the effectiveness of the proposed scheme is evaluated by simulation, then assessing it to different types of cryptanalytic analyses such as information entropy analysis, adjacent pixel correlation, differential attack analysis, key sensitivity analysis, and histogram analysis. …”
    Get full text
    Article
  4. 84

    Adaptive image encryption approach using an enhanced swarm intelligence algorithm by Sachin Minocha, Suvita Rani Sharma, Birmohan Singh, Amir H. Gandomi

    Published 2025-03-01
    “…Different analyses, such as visual analysis, statistical attack analysis, differential attack analysis, and quantitative analysis, have been utilized to assess the effectiveness of the proposed encryption approach. …”
    Get full text
    Article
  5. 85

    Novel One-Dimensional Chaotic System and Its Application in Image Encryption by Zhiqiang Cheng, Wencheng Wang, Yuezhang Dai, Lun Li

    Published 2022-01-01
    “…Simulation experiments show that the method can remarkably resist standard attack methods.…”
    Get full text
    Article
  6. 86

    Networked Chaotic Map Model and Its Applications in Color Multiple Image Encryption by Yu-jie Sun, Hao Zhang, Chun-peng Wang, Zhen-yu Li, Xing-yuan Wang

    Published 2020-01-01
    “…Several analyses, including histogram analysis, information entropy analysis, correlation analysis, key sensitivity, differential attack analysis, and resistance analyses, are performed to test the effectiveness and robustness of the proposed multiple image encryption algorithm with a networked chaotic map model.…”
    Get full text
    Article
  7. 87

    Cyber Sanctions as a Tool of Competition in Global Cyberspace by S. I. Balakhonova

    Published 2023-04-01
    “…The article investigates the risks posed by cyber-attacks, studies the nature of the contradictions between the norms of international law and cyber sanctions, carries out an analysis of the legal frameworks of the main initiating countries, and reviews the practice of imposing cyber sanctions. …”
    Get full text
    Article
  8. 88

    Privacy preserving federated learning with convolutional variational bottlenecks by Daniel Scheliga, Patrick Mäder, Marco Seeland

    Published 2025-05-01
    “…Recent work has proposed to prevent gradient leakage without loss of model utility by incorporating a PRivacy EnhanCing mODulE (PRECODE) based on variational modeling. Without further analysis, it was shown that PRECODE successfully protects against GI attacks. …”
    Get full text
    Article
  9. 89

    A New Image Encryption Method Using an Optimized Smart Codebook by Rami Sihwail, Dyala Ibrahim

    Published 2025-01-01
    “…Image encryption is essential to prevent attackers from unauthorized access to confidential images. …”
    Get full text
    Article
  10. 90

    Leveraging Finite-Precision Errors in Chaotic Systems for Enhanced Image Encryption by B. M. El-Den, Saad Aldosary, Haitham Khaled, Tarek M. Hassan, Walid Raslan

    Published 2024-01-01
    “…Evaluation criteria encompassed key space analysis, pixel correlation, entropy of information, histogram analysis, and resistance to noise attacks. …”
    Get full text
    Article
  11. 91

    Secure Image Transmission Using Multilevel Chaotic Encryption and Video Steganography by Suhad Naji Alrekaby, Maisa’a Abid Ali Khodher, Layth Kamil Adday, Reem Aljuaidi

    Published 2025-07-01
    “…Traditional encryption techniques, particularly in multimedia applications, frequently fail to defend against sophisticated attacks, such as chosen-plaintext, differential, and statistical analysis attacks. …”
    Get full text
    Article
  12. 92

    Random Strip Peeling: A novel lightweight image encryption for IoT devices based on colour planes permutation by Kenan İnce, Cemile İnce, Davut Hanbay

    Published 2025-04-01
    “…Different evaluation metrics, such as entropy analysis, key sensitivity, statistical and differential attacks resistance, and robustness analysis demonstrate the proposed algorithm's lightweight, robust, and efficient. …”
    Get full text
    Article
  13. 93

    Sparse point spread function-based multi-image optical encryption by Ning Xu, Dalong Qi, Long Cheng, Zhen Pan, Chengyu Zhou, Wenzhang Lin, Hongmei Ma, Yunhua Yao, Yuecheng Shen, Lianzhong Deng, Zhenrong Sun, Shian Zhang

    Published 2025-04-01
    “…During decryption, an iterative algorithm recovers encrypted images with improved reconstruction quality. We show that sPSF-MOE ensures high fidelity for binary (gray-scale) images at a compression ratio of 12 (6) and resists autocorrelation-based attacks. …”
    Get full text
    Article
  14. 94

    Image Processing Method Based on Chaotic Encryption and Wavelet Transform for Planar Design by Yiying Liu, Young Chun Ko

    Published 2021-01-01
    “…In terms of the security of the graphic design image itself, the complex dynamical properties of chaos are fully utilized to encrypt it, and the algorithm has a good encryption effect after statistical characteristic analysis, attack complexity, difference analysis, adjacent pixel correlation analysis, and key sensitivity analysis. …”
    Get full text
    Article
  15. 95

    A new video image encryption algorithm based on improved composite mapping by Tu Li, Liu Zhen, Wang Yan, Yang Gelan

    Published 2025-01-01
    “…This encryption algorithm can well resist the attack of statistical analysis and it has a good encryption effect on video.…”
    Get full text
    Article
  16. 96

    Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution by Nawal Shaltout, Ahmed A.Abd El-Latif, Waleed M. Al-Adrousy, Samir Elmougy

    Published 2023-01-01
    “…The results of security testing and analysis revealed that our image security method is strongly recommended for modern communications security applications.…”
    Get full text
    Article
  17. 97

    A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption by Yuzhou Xi, Yu Ning, Jie Jin, Fei Yu

    Published 2024-12-01
    “…To enhance the security of the traditional Hill cipher (THC) and expand its application in medical image encryption, a novel dynamic Hill cipher with Arnold scrambling technique (DHCAST) is proposed in this work. …”
    Get full text
    Article
  18. 98

    A robust fragile watermarking approach for image tampering detection and restoration utilizing hybrid transforms by S. Prasanth Vaidya, Rajesh N. V. P. S. Kandala, P. V. S. S. R. Chandra Mouli, Hatim G. Zaini, Amar Jaffar, Prabhu Paramasivam, Sherif S. M. Ghoneim

    Published 2025-05-01
    “…The proposed method integrates Schur decomposition and discrete wavelet transform (DWT) for watermark embedding, ensuring robustness against attacks compared to existing methods. Schur decomposition provides numerical stability in matrix factorization, while DWT enhances resilience through multi-resolution analysis. …”
    Get full text
    Article
  19. 99

    Explainability-driven adversarial robustness assessment for generalized deepfake detectors by Lorenzo Cirillo, Andrea Gervasio, Irene Amerini

    Published 2025-08-01
    “…We feed the model with the resulting adversarial images and measure the accuracy drop and the attack success rate. …”
    Get full text
    Article
  20. 100

    Multiple image encryption algorithm using channel randomization and multiple chaotic maps by Khalid M. Hosny, Yasmin M. Elnabawy, Rania A. Salama, Ahmed M. Elshewey

    Published 2024-12-01
    “…Moreover, experimental results and a thorough security analysis affirm that the proposed encryption technique has effectively attained confidentiality and robust resistance against various attacks.…”
    Get full text
    Article