-
101
Image Encryption Based on High-Dimensional Manifold Computing and Block Dividing Algorithm
Published 2020-01-01“…The encryption efficiency is enhanced by choosing the sensitive flows of the high-dimension system. The analysis proved that the novel image encryption scheme can resist all common kinds of attacks.…”
Get full text
Article -
102
Securing face images in UAV networks using chaos and DNA cryptography approach
Published 2025-07-01“…Experimental outcomes and security analysis confirm that this face encryption scheme provides robust security and high efficiency, as evidenced by key performance metrics specifically an information entropy value of 7.9992, MSE of 8908.61, PSNR of 8.9619, SSIM of 0.00091, NPCR of 99.7163%, UACI of 33.5671%, demonstrating the robustness of our encryption algorithm against differential attacks, and a key space of $$\:\:{2}^{1024}$$ , ensuring resistance against brute-force attacks. …”
Get full text
Article -
103
An Image Encryption Algorithm Based on Hyperchaotic System and Variable-Step Josephus Problem
Published 2020-01-01“…The experimental results show that image encryption algorithm proposed in this paper has plaintext sensitivity and can resist the common attacks.…”
Get full text
Article -
104
Square-Based Division Scheme for Image Encryption Using Generalized Fibonacci Matrices
Published 2025-05-01“…Experimental results on widely-used benchmark images and a comparative analysis against State-of-the-Art encryption algorithms demonstrate that SBD-Fibonacci achieves high entropy, strong resistance to differential and statistical attacks, and efficient runtime performance—even for large images.…”
Get full text
Article -
105
Zero Watermarking Algorithm for Hyperspectral Remote Sensing Images Considering Spectral and Spatial Features
Published 2025-01-01“…First, principal component analysis is applied to reduce the dimensionality of the hyperspectral image, and the leading principal component is used for K-means clustering. …”
Get full text
Article -
106
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“…Based on the results of program analysis and testing, it can be concluded that the more messages that are inserted in the image, the more pixel differences there are in the stego image. …”
Get full text
Article -
107
Influence of Flow Field on the Imaging Quality of Star Sensors for Hypersonic Vehicles in near Space
Published 2025-07-01“…A comparative analysis of the imaging quality results from the two methods reveals their respective strengths and limitations. …”
Get full text
Article -
108
Characterizing anterior and posterior circulation strokes using high-resolution magnetic resonance imaging
Published 2025-08-01“…Background and Purpose: High-resolution magnetic resonance imaging (HR-MRI) is increasingly used to assess intracranial atherosclerosis (ICAS). …”
Get full text
Article -
109
A secure medical image encryption technique based on DNA cryptography with elliptic curves
Published 2025-06-01“…With progress in imaging technologies and biomedical processing algorithms, the amount of image data increases rapidly. …”
Get full text
Article -
110
Hyperchaotic System-Based PRNG and S-Box Design for a Novel Secure Image Encryption
Published 2025-03-01“…Security evaluations, including histogram analysis, entropy measurement, correlation analysis, and resistance to differential and noise attacks, were conducted. …”
Get full text
Article -
111
Enhanced Image Security through 4D Hyperchaotic System and Hybrid Key Techniques
Published 2024-11-01“…The findings reveal that the method effectively breaks pixel correlation, rendering the encrypted image unrecognizable. Histogram analysis confirms a uniform pixel distribution, while robustness tests show the system can maintain image quality despite manipulations or attacks. …”
Get full text
Article -
112
An enhanced image protection framework: polynomial-based secret sharing meets information hiding
Published 2025-07-01“…Abstract The security of modern communication requires not only the confidentiality of communication content but also the concealment of communication behavior. Secret image sharing has emerged as a prominent research topic in recent years, aiming to transfer meaningful shares while ensuring that covert communication activities remain hidden from potential attackers' monitoring and analysis. …”
Get full text
Article -
113
A combinatory approach of non-chain ring and henon map for image encryption application
Published 2025-01-01“…This algebraic approach utilizes a robust and state-of-the-art image encryption system that is highly effective against potential attackers.…”
Get full text
Article -
114
A New Three Dimensional Chaotic Dynamical System and Digital Image Encryption Method
Published 2018-12-01“…Based on the chaotic system, the establishment of a new digital image encryption method, and the simulation analysis, experimental results show that the image encryption using the method has good ability to resist various attacks for the cipher text …”
Get full text
Article -
115
Fast and Robust Image Encryption Scheme Based on Quantum Logistic Map and Hyperchaotic System
Published 2022-01-01“…Because of the dependence on the plain image, the algorithm can frustrate the chosen-plaintext and known-plaintext attacks. …”
Get full text
Article -
116
Application of LSB Steganography for Encrypted Data Using Triple Transposition Vigenere on Digital Images
Published 2025-08-01“…Steganography, particularly the Least Significant Bit (LSB) technique, is widely adopted due to its simplicity and minimal impact on digital image quality. Nevertheless, it is prone to detection through steganalysis attacks. …”
Get full text
Article -
117
A two-stage HDR reconstruction pipeline for extreme dark-light RGGB images
Published 2025-01-01“…This study attacks the problem by proposing a novel multi-step process for image enhancement. …”
Get full text
Article -
118
Multi-Size Image Encryption Algorithm Based on Fractional-Order Cellular Neural Network
Published 2024-01-01“…Finally, through simulation verification and analysis of relevant test results, It can be proved that the encryption scheme in this paper can resist various external attacks.…”
Get full text
Article -
119
A robust approach to satellite image encryption using chaotic map and circulant matrices
Published 2024-12-01“…Comprehensive testing against various attacks including correlation, histogram, chi‐square, NPCR, PSNR, UACI, SSIM, key space and key sensitivity analysis confirms the scheme's robustness, efficiency and speed. …”
Get full text
Article -
120
Driver Drowsiness Detection Using Swin Transformer and Diffusion Models for Robust Image Denoising
Published 2025-01-01“…This study presents a robust and scalable driver drowsiness detection framework that integrates a Swin Transformer-based deep learning model with a diffusion model for image denoising. While conventional convolutional neural networks (CNNs) are effective in standard vision tasks, they often suffer performance degradation in real-world driving scenarios due to noise, poor lighting, motion blur, and adversarial attacks. …”
Get full text
Article