Search alternatives:
image » images (Expand Search)
Showing 101 - 120 results of 261 for search 'attack image analysis', query time: 0.12s Refine Results
  1. 101

    Image Encryption Based on High-Dimensional Manifold Computing and Block Dividing Algorithm by Meng Jia

    Published 2020-01-01
    “…The encryption efficiency is enhanced by choosing the sensitive flows of the high-dimension system. The analysis proved that the novel image encryption scheme can resist all common kinds of attacks.…”
    Get full text
    Article
  2. 102

    Securing face images in UAV networks using chaos and DNA cryptography approach by Saba Inam, Shamsa Kanwal, Eaman Amin, Omar Cheikhrouhou, Monia Hamdi

    Published 2025-07-01
    “…Experimental outcomes and security analysis confirm that this face encryption scheme provides robust security and high efficiency, as evidenced by key performance metrics specifically an information entropy value of 7.9992, MSE of 8908.61, PSNR of 8.9619, SSIM of 0.00091, NPCR of 99.7163%, UACI of 33.5671%, demonstrating the robustness of our encryption algorithm against differential attacks, and a key space of $$\:\:{2}^{1024}$$ , ensuring resistance against brute-force attacks. …”
    Get full text
    Article
  3. 103

    An Image Encryption Algorithm Based on Hyperchaotic System and Variable-Step Josephus Problem by Xuncai Zhang, Lingfei Wang, Yanfeng Wang, Ying Niu, Yinhua Li

    Published 2020-01-01
    “…The experimental results show that image encryption algorithm proposed in this paper has plaintext sensitivity and can resist the common attacks.…”
    Get full text
    Article
  4. 104

    Square-Based Division Scheme for Image Encryption Using Generalized Fibonacci Matrices by Panagiotis Oikonomou, George K. Kranas, Maria Sapounaki, Georgios Spathoulas, Aikaterini Aretaki, Athanasios Kakarountas, Maria Adam

    Published 2025-05-01
    “…Experimental results on widely-used benchmark images and a comparative analysis against State-of-the-Art encryption algorithms demonstrate that SBD-Fibonacci achieves high entropy, strong resistance to differential and statistical attacks, and efficient runtime performance—even for large images.…”
    Get full text
    Article
  5. 105

    Zero Watermarking Algorithm for Hyperspectral Remote Sensing Images Considering Spectral and Spatial Features by Bingbing Yang, Haowen Yan, Liming Zhang, Qingbo Yan, Zhaoyang Hou, Xiaolong Wang, Xinyu Xu

    Published 2025-01-01
    “…First, principal component analysis is applied to reduce the dimensionality of the hyperspectral image, and the leading principal component is used for K-means clustering. …”
    Get full text
    Article
  6. 106

    The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key by Ilham Firman Ashari, Eko Dwi Nugroho, Dodi Devrian Andrianto, M. Asyroful Nur Maulana Yusuf, Makruf Alkarkhi

    Published 2024-03-01
    “…Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. …”
    Get full text
    Article
  7. 107

    Influence of Flow Field on the Imaging Quality of Star Sensors for Hypersonic Vehicles in near Space by Siyao Wu, Ting Sun, Fei Xing, Haonan Liu, Kang Yang, Jiahui Song, Shijie Yu, Lianqing Zhu

    Published 2025-07-01
    “…A comparative analysis of the imaging quality results from the two methods reveals their respective strengths and limitations. …”
    Get full text
    Article
  8. 108

    Characterizing anterior and posterior circulation strokes using high-resolution magnetic resonance imaging by Hongshan Chu, Shibo Dong, Yuan Zhang, Hongyu Hao, Ruisheng Duan, Xing Xing, Nan Yin, Jin An, Ya Gao, Xiangjian Xiao

    Published 2025-08-01
    “…Background and Purpose: High-resolution magnetic resonance imaging (HR-MRI) is increasingly used to assess intracranial atherosclerosis (ICAS). …”
    Get full text
    Article
  9. 109

    A secure medical image encryption technique based on DNA cryptography with elliptic curves by V. N. Senthil Kumaran, T. Manikandan, Rajesh Kumar Dhanaraj, Taher Al-Shehari, Nasser A. Alsadhan, Shitharth Selvarajan

    Published 2025-06-01
    “…With progress in imaging technologies and biomedical processing algorithms, the amount of image data increases rapidly. …”
    Get full text
    Article
  10. 110

    Hyperchaotic System-Based PRNG and S-Box Design for a Novel Secure Image Encryption by Erman Özpolat, Vedat Çelik, Arif Gülten

    Published 2025-03-01
    “…Security evaluations, including histogram analysis, entropy measurement, correlation analysis, and resistance to differential and noise attacks, were conducted. …”
    Get full text
    Article
  11. 111

    Enhanced Image Security through 4D Hyperchaotic System and Hybrid Key Techniques by Muhammad Naufal Erza Farandi, Sri Winarno, Zahrah Asri Nur Fauzyah

    Published 2024-11-01
    “…The findings reveal that the method effectively breaks pixel correlation, rendering the encrypted image unrecognizable. Histogram analysis confirms a uniform pixel distribution, while robustness tests show the system can maintain image quality despite manipulations or attacks. …”
    Get full text
    Article
  12. 112

    An enhanced image protection framework: polynomial-based secret sharing meets information hiding by Xiaopeng Li, Zhengxin Fu, Yuan Gao, Bin Yu

    Published 2025-07-01
    “…Abstract The security of modern communication requires not only the confidentiality of communication content but also the concealment of communication behavior. Secret image sharing has emerged as a prominent research topic in recent years, aiming to transfer meaningful shares while ensuring that covert communication activities remain hidden from potential attackers' monitoring and analysis. …”
    Get full text
    Article
  13. 113

    A combinatory approach of non-chain ring and henon map for image encryption application by Salman Mohi Ud Din, Tariq Shah, Fahad Alblehai, Sameer Nooh, Sajjad Shaukat Jamal

    Published 2025-01-01
    “…This algebraic approach utilizes a robust and state-of-the-art image encryption system that is highly effective against potential attackers.…”
    Get full text
    Article
  14. 114

    A New Three Dimensional Chaotic Dynamical System and Digital Image Encryption Method by SUN Guang-ming, HUANG Jin-jie, ZHANG Yu

    Published 2018-12-01
    “…Based on the chaotic system, the establishment of a new digital image encryption method, and the simulation analysis, experimental results show that the image encryption using the method has good ability to resist various attacks for the cipher text …”
    Get full text
    Article
  15. 115

    Fast and Robust Image Encryption Scheme Based on Quantum Logistic Map and Hyperchaotic System by Nehal Abd El-Salam Mohamed, Aliaa Youssif, Hala Abdel-Galil El-Sayed

    Published 2022-01-01
    “…Because of the dependence on the plain image, the algorithm can frustrate the chosen-plaintext and known-plaintext attacks. …”
    Get full text
    Article
  16. 116

    Application of LSB Steganography for Encrypted Data Using Triple Transposition Vigenere on Digital Images by Eko Aribowo, Windy Sayyida Amalya, Nur Rochmah Dyah Puji Astuti

    Published 2025-08-01
    “…Steganography, particularly the Least Significant Bit (LSB) technique, is widely adopted due to its simplicity and minimal impact on digital image quality. Nevertheless, it is prone to detection through steganalysis attacks. …”
    Get full text
    Article
  17. 117

    A two-stage HDR reconstruction pipeline for extreme dark-light RGGB images by Yiyao Huang, Xiaobao Zhu, Fenglian Yuan, Jing Shi, U. Kintak, Jingfei Fu, Yiran Peng, Chenheng Deng

    Published 2025-01-01
    “…This study attacks the problem by proposing a novel multi-step process for image enhancement. …”
    Get full text
    Article
  18. 118

    Multi-Size Image Encryption Algorithm Based on Fractional-Order Cellular Neural Network by Yinghong Cao, Yan Liu, Kaihua Wang, Xianying Xu, Jinshi Lu

    Published 2024-01-01
    “…Finally, through simulation verification and analysis of relevant test results, It can be proved that the encryption scheme in this paper can resist various external attacks.…”
    Get full text
    Article
  19. 119

    A robust approach to satellite image encryption using chaotic map and circulant matrices by Shamsa Kanwal, Saba Inam, Asghar Ali Shah, Halima Iqbal, Anas Bilal, Muhammad Usman Hashmi, Raheem Sarwar

    Published 2024-12-01
    “…Comprehensive testing against various attacks including correlation, histogram, chi‐square, NPCR, PSNR, UACI, SSIM, key space and key sensitivity analysis confirms the scheme's robustness, efficiency and speed. …”
    Get full text
    Article
  20. 120

    Driver Drowsiness Detection Using Swin Transformer and Diffusion Models for Robust Image Denoising by Samy Abd El-Nabi, Ahmed F. Ibrahim, El-Sayed M. El-Rabaie, Osama F. Hassan, Naglaa F. Soliman, Khalil F. Ramadan, Walid El-Shafai

    Published 2025-01-01
    “…This study presents a robust and scalable driver drowsiness detection framework that integrates a Swin Transformer-based deep learning model with a diffusion model for image denoising. While conventional convolutional neural networks (CNNs) are effective in standard vision tasks, they often suffer performance degradation in real-world driving scenarios due to noise, poor lighting, motion blur, and adversarial attacks. …”
    Get full text
    Article