-
1
Development AES Algorithm to Encryption Images and Sounds Files
Published 2012-07-01“…In this research, the Advanced Encryption Standard (AES) algorithm was developed, the AES is used for encryption and decryption the images and sounds files by expanding the block size of data to reach the maximum size of 512 bit instead 128 bit/cycle, by using the Thread API techniques, which is a break off CPU working for increasing times taken the inline encrypt or decrypt operations. …”
Get full text
Article -
2
A Hyperchaotic Lorenz and DNA-Encoded Image Encryption Algorithm
Published 2024-01-01“…In order to solve the problem that images are easy to leak and tamper during transmission and enhance the safety of image encryption, an image encryption algorithm based on deoxyribonucleic acid (DNA) coding and hyperchaotic Lorenz system is proposed. …”
Get full text
Article -
3
An Image Encryption Algorithm Based on Hyperchaotic System and Variable-Step Josephus Problem
Published 2020-01-01“…In this paper, an image encryption algorithm based on a hyperchaotic system and variable-step Josephus problem is proposed. …”
Get full text
Article -
4
A new video image encryption algorithm based on improved composite mapping
Published 2025-01-01“…The simulation results show that: the histogram of the encrypted image is uniformly distributed, the encryption algorithm is very sensitive to the initial key, and the initial value sensitivity performance reaches10-13, it takes only 7.9 seconds to encrypt a 328 frame video by using this algorithm, and it takes only 5.4 seconds to decrypt this video. …”
Get full text
Article -
5
A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits
Published 2021-01-01“…To protect image information security, we propose an encryption algorithm based on chaotic sequences and bits' cross-diffusion. …”
Get full text
Article -
6
Secure Data Collection Method Based on Quantum Encryption Algorithm for Power IoT Gateway
Published 2025-06-01“…Based on the quantum encryption algorithm, the original quantum key is obtained by selecting the two-dimensional Henon chaotic mapping method through the feature vector. …”
Get full text
Article -
7
Color Image Encryption Based on Five-Dimensional Continuous Hyperchaotic System and Optimized Arnold Algorithm
Published 2025-06-01“…This paper introduces a novel color image encryption algorithm based on a five-dimensional continuous memristor hyperchaotic system (5D-MHS), combined with a two-dimensional Salomon map and an optimized Arnold transform. …”
Get full text
Article -
8
Attribute encryption access control method of high dimensional medical data based on fuzzy algorithm.
Published 2025-01-01“…Consequently, a high-dimensional medical data attribute encryption access control method based on fuzzy algorithm is proposed. …”
Get full text
Article -
9
Blockchain-Enhanced Attribute-Based Encryption Architecture With Feasibility Analysis
Published 2025-01-01Get full text
Article -
10
Lightweight Image Encryption Algorithm Using 4D-NDS: Compound Dynamic Diffusion and Single-Round Efficiency
Published 2025-01-01“…Additionally, the single-round composite double-diffusion system significantly improves the security and reliability of the algorithm, with the information entropy of the encrypted image reaching 7.9994. …”
Get full text
Article -
11
Adaptive encryption method of sensitive data in data center database based on big data cross-mapping fusion algorithm
Published 2025-08-01“…This approach transforms the serial operation structure of the AES algorithm into a parallel operation structure, enabling adaptive encryption of fusion sensitive data. …”
Get full text
Article -
12
A sector fast encryption algorithm for color images based on one-dimensional composite sinusoidal chaos map.
Published 2025-01-01“…Based on previous various chaotic image fast encryption algorithms, this paper proposes a color image sector fast encryption algorithm based on one-dimensional composite sinusoidal chaotic mapping. …”
Get full text
Article -
13
Encrypted traffic identification method based on deep residual capsule network with attention mechanism
Published 2023-02-01“…With the improvement of users’ security awareness and the development of encryption technology, encrypted traffic has become an important part of network traffic, and identifying encrypted traffic has become an important part of network traffic supervision.The encrypted traffic identification method based on the traditional deep learning model has problems such as poor effect and long model training time.To address these problems, the encrypted traffic identification method based on a deep residual capsule network (DRCN) was proposed.However, the original capsule network was stacked in the form of full connection, which lead to a small model coupling coefficient and it was impossible to build a deep network model.The DRCN model adopted the dynamic routing algorithm based on the three-dimensional convolutional algorithm (3DCNN) instead of the fully-connected dynamic routing algorithm, to reduce the parameters passed between each capsule layer, decrease the complexity of operations, and then build the deep capsule network to improve the accuracy and efficiency of recognition.The channel attention mechanism was introduced to assign different weights to different features, and then the influence of useless features on the recognition results was reduced.The introduction of the residual network into the capsule network layer and the construction of the residual capsule network module alleviated the gradient disappearance problem of the deep capsule network.In terms of data pre-processing, the first 784byte of the intercepted packets was converted into images as input of the DRCN model, to avoid manual feature extraction and reduce the labor cost of encrypted traffic recognition.The experimental results on the ISCXVPN2016 dataset show that the accuracy of the DRCN model is improved by 5.54% and the training time of the model is reduced by 232s compared with the BLSTM model with the best performance.In addition, the accuracy of the DRCN model reaches 94.3% on the small dataset.The above experimental results prove that the proposed recognition scheme has high recognition rate, good performance and applicability.…”
Get full text
Article -
14
Image encryption scheme based on thorp shuffle and pseudo dequeue
Published 2025-04-01“…The results show that the algorithm proposed in this paper has high encryption efficiency and security and performs excellently in terms of anti-attack performance.…”
Get full text
Article -
15
A study of massive multidimensional data sharing and interaction algorithms based on cloud-edge collaboration
Published 2025-03-01“…Therefore, this article proposes a massive multi-dimensional data sharing and interaction algorithm based on cloud edge collaboration. In the edge layer and cloud layer, data from sensors and nodes undergo re-encryption through proxies during the collection process. …”
Get full text
Article -
16
Fuzzy Encryption Search Scheme and Data Verification Mechanism Based on Blockchain
Published 2025-04-01“…First, privacy protection of the raw data is achieved through a hierarchical Mini Batch K-Means clustering algorithm and locally sensitive hash functions. Second, the study proposes a blockchain data verification mechanism that employs a fuzzy encryption search scheme, in conjunction with cloud storage and a fuzzy encryption algorithm. …”
Get full text
Article -
17
A New Asymmetric Fully Homomorphic Encryption Scheme for Cloud Banking Data
Published 2021-01-01“…Our current research provides a new algorithm for a publicly-keyed encryption system to keep bank data from tampering and theft when stored on the cloud computing platform, and our new system achieves fully Homomorphic Encryption, which allows mathematical operations to be performed on the encrypted text without the need for the original text. …”
Get full text
Article -
18
An Audio Steganography to Protect data in Text, Images and Audio with Hybrid Encryption Techniques
Published 2025-07-01“…The method begins with strong AES encryption, which is then followed by a clever scrambling algorithm inspired by the Rubik’s Cube. …”
Get full text
Article -
19
A Dynamic Hill Cipher with Arnold Scrambling Technique for Medical Images Encryption
Published 2024-12-01“…Moreover, the Peak Signal to Noise Ratio (PSNR) and Number of Pixel Change Rate (NPCR) of the proposed DHCAST algorithm reach 9.51 and 99.74%, respectively, which effectively validates its excellent encryption quality and attack prevention ability.…”
Get full text
Article -
20
High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing
Published 2023-09-01“…To improve the security, robustness and embedding rate of reversible hiding in encrypted domain in the distributed environment, a multiple embedding algorithm based on cipher-feedback secret sharing was proposed.Firstly, the additional data were embedded into the polynomial coefficients redundancy generated in the process of secret image sharing.Secondly, the extra secrets were embedded by using the additive homomorphism of secret sharing.Experimental results demonstrate that a better security and robustness has been obtained by improving the diffusion characteristic of secret sharing using the feedback mechanism.In the (3,4) and (3,5) threshold, the embedding rates can reach 6.00 bit per pixel and 4.80 bit per pixel respectively.The proposed algorithm can not only maintain the strong security and separability, but also obtain a better embedding capacity.Meanwhile, the embedding rate of the scheme is not affected by the carrier image and is only related to the selection of algorithm parameters.…”
Get full text
Article