-
81
An Image Encryption Scheme Based on DNA Computing and Cellular Automata
Published 2016-01-01“…The results of a simulation experiment, performance analysis, and comparison to other encryption algorithms showed this algorithm to be capable of resisting brute force attacks, statistical attacks, and differential attacks. …”
Get full text
Article -
82
Image Encryption-Then-Transmission Using DNA Encryption Algorithm and The Double Chaos
Published 2018-01-01“…The simulation results verify that the cryptosystem is enough against the traditional attacks, such as statistical attack, differential attack, brute force attack, and entropy attack. …”
Get full text
Article -
83
Two-Layer Security for Image Encryption: A Switched System Approach
Published 2025-01-01“…Finally, the effectiveness of the proposed scheme is evaluated by simulation, then assessing it to different types of cryptanalytic analyses such as information entropy analysis, adjacent pixel correlation, differential attack analysis, key sensitivity analysis, and histogram analysis. …”
Get full text
Article -
84
Adaptive image encryption approach using an enhanced swarm intelligence algorithm
Published 2025-03-01“…Different analyses, such as visual analysis, statistical attack analysis, differential attack analysis, and quantitative analysis, have been utilized to assess the effectiveness of the proposed encryption approach. …”
Get full text
Article -
85
Novel One-Dimensional Chaotic System and Its Application in Image Encryption
Published 2022-01-01“…Simulation experiments show that the method can remarkably resist standard attack methods.…”
Get full text
Article -
86
Networked Chaotic Map Model and Its Applications in Color Multiple Image Encryption
Published 2020-01-01“…Several analyses, including histogram analysis, information entropy analysis, correlation analysis, key sensitivity, differential attack analysis, and resistance analyses, are performed to test the effectiveness and robustness of the proposed multiple image encryption algorithm with a networked chaotic map model.…”
Get full text
Article -
87
Cyber Sanctions as a Tool of Competition in Global Cyberspace
Published 2023-04-01“…The article investigates the risks posed by cyber-attacks, studies the nature of the contradictions between the norms of international law and cyber sanctions, carries out an analysis of the legal frameworks of the main initiating countries, and reviews the practice of imposing cyber sanctions. …”
Get full text
Article -
88
Privacy preserving federated learning with convolutional variational bottlenecks
Published 2025-05-01“…Recent work has proposed to prevent gradient leakage without loss of model utility by incorporating a PRivacy EnhanCing mODulE (PRECODE) based on variational modeling. Without further analysis, it was shown that PRECODE successfully protects against GI attacks. …”
Get full text
Article -
89
A New Image Encryption Method Using an Optimized Smart Codebook
Published 2025-01-01“…Image encryption is essential to prevent attackers from unauthorized access to confidential images. …”
Get full text
Article -
90
Leveraging Finite-Precision Errors in Chaotic Systems for Enhanced Image Encryption
Published 2024-01-01“…Evaluation criteria encompassed key space analysis, pixel correlation, entropy of information, histogram analysis, and resistance to noise attacks. …”
Get full text
Article -
91
Secure Image Transmission Using Multilevel Chaotic Encryption and Video Steganography
Published 2025-07-01“…Traditional encryption techniques, particularly in multimedia applications, frequently fail to defend against sophisticated attacks, such as chosen-plaintext, differential, and statistical analysis attacks. …”
Get full text
Article -
92
Random Strip Peeling: A novel lightweight image encryption for IoT devices based on colour planes permutation
Published 2025-04-01“…Different evaluation metrics, such as entropy analysis, key sensitivity, statistical and differential attacks resistance, and robustness analysis demonstrate the proposed algorithm's lightweight, robust, and efficient. …”
Get full text
Article -
93
Sparse point spread function-based multi-image optical encryption
Published 2025-04-01“…During decryption, an iterative algorithm recovers encrypted images with improved reconstruction quality. We show that sPSF-MOE ensures high fidelity for binary (gray-scale) images at a compression ratio of 12 (6) and resists autocorrelation-based attacks. …”
Get full text
Article -
94
Image Processing Method Based on Chaotic Encryption and Wavelet Transform for Planar Design
Published 2021-01-01“…In terms of the security of the graphic design image itself, the complex dynamical properties of chaos are fully utilized to encrypt it, and the algorithm has a good encryption effect after statistical characteristic analysis, attack complexity, difference analysis, adjacent pixel correlation analysis, and key sensitivity analysis. …”
Get full text
Article -
95
A new video image encryption algorithm based on improved composite mapping
Published 2025-01-01“…This encryption algorithm can well resist the attack of statistical analysis and it has a good encryption effect on video.…”
Get full text
Article -
96
Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution
Published 2023-01-01“…The results of security testing and analysis revealed that our image security method is strongly recommended for modern communications security applications.…”
Get full text
Article -
97
A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption
Published 2024-12-01“…To enhance the security of the traditional Hill cipher (THC) and expand its application in medical image encryption, a novel dynamic Hill cipher with Arnold scrambling technique (DHCAST) is proposed in this work. …”
Get full text
Article -
98
A robust fragile watermarking approach for image tampering detection and restoration utilizing hybrid transforms
Published 2025-05-01“…The proposed method integrates Schur decomposition and discrete wavelet transform (DWT) for watermark embedding, ensuring robustness against attacks compared to existing methods. Schur decomposition provides numerical stability in matrix factorization, while DWT enhances resilience through multi-resolution analysis. …”
Get full text
Article -
99
Explainability-driven adversarial robustness assessment for generalized deepfake detectors
Published 2025-08-01“…We feed the model with the resulting adversarial images and measure the accuracy drop and the attack success rate. …”
Get full text
Article -
100
Multiple image encryption algorithm using channel randomization and multiple chaotic maps
Published 2024-12-01“…Moreover, experimental results and a thorough security analysis affirm that the proposed encryption technique has effectively attained confidentiality and robust resistance against various attacks.…”
Get full text
Article