Article
Optics
Xingyuan Wang, Maochang Zhao
Summary: The chaotic image encryption scheme combines block scrambling and DNA coding to achieve encryption. By changing pixel values, scrambling image indexes, and using DNA coding rules, the algorithm demonstrates good encryption effect and resistance to common attacks.
OPTICS AND LASER TECHNOLOGY
(2021)
Article
Mathematics
C. Beaula, P. Venugopal, B. Praba
Summary: Encryption and decryption are two processes in cryptography that protect and transmit important information without interruption by third parties in a network. Cryptography, a branch of computer science, requires frequent system updates and relies on mathematical concepts such as number theory and algebra. Recently, graph theory concepts have been utilized to enhance the strength of cryptography. This paper proposes a cryptosystem using the Turan graph, which has a complex graph structure. The use of Turan graph adds robustness to the cryptosystem, as it is a unique multipartite complete graph with more edges. The paper presents the decomposition of the Turan graph into paths and stars, along with the application of edge labeling for encryption and decryption of sentences consisting of k words. Encryption and decryption algorithms are also introduced.
JOURNAL OF MATHEMATICS
(2023)
Article
Computer Science, Information Systems
S. Arunpandian, S. S. Dhenakaran
Summary: This research introduces a new symmetric encryption algorithm for ciphering unique identification numbers and biometric images in India. By utilizing existing unique numbers, the algorithm generates secret keys and cipher images, improving security measures.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2021)
Article
Engineering, Civil
Peiya Li, Zefan Sun, Zhenhui Situ, Meiling He, Tingting Song
Summary: This paper proposes a new method for protecting JPEG images by introducing encryption operations into the compression process. By dividing the plain-image into different sizes of blocks and applying encryption techniques, the proposed method ensures both the security and compression efficiency of the JPEG images.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Mathematics, Interdisciplinary Applications
Wenlong Dong, Qiliang Li, Yiwen Tang
Summary: This paper presents an image encryption scheme based on random sub-block scrambling and loop deoxyribonucleic acid algorithm in optical chaotic system. By manipulating control parameters with optical chaotic sequences, encryption is achieved, and a security analysis and data transmission simulation are conducted for verification.
CHAOS SOLITONS & FRACTALS
(2021)
Article
Computer Science, Information Systems
Pramod Pavithran, Sheena Mathew, Suyel Namasudra, Gautam Srivastava
Summary: This paper proposes a novel encryption process based on DNA cryptography, a hyperchaotic system, and a Moore machine, which can protect highly confidential data in a system and improve the security and efficiency of the system.
COMPUTER COMMUNICATIONS
(2022)
Article
Computer Science, Information Systems
Feng Yu, Xinhui Gong, Hanpeng Li, Shihong Wang
Summary: An image encryption algorithm using block-based scrambling and image filtering was proposed, and its security issues were analyzed in detail. A codebook attack was used to break the encryption, leading to the proposal of an improved algorithm to enhance security robustness. Experimental results demonstrated the effectiveness of the improved algorithm against differential cryptanalysis and codebook attacks.
INFORMATION SCIENCES
(2021)
Article
Physics, Multidisciplinary
Ziying Zhang, Lin Teng
Summary: This paper proposes a novel chaotic DICOM image encryption algorithm based on pseudo-random polyline and rapid diffusion-scrambling. The algorithm preprocesses the image twice in the encryption process to ensure any type of image can be encrypted, including images with negative pixel values, enhancing the practicality of the algorithm. Two pseudo-random polylines are generated to segment the image, ensuring different polylines for each image and increasing the security of the algorithm. The encryption process involves rapid diffusion-scrambling, piecewise diffusion, and non-adjacent matrix reading for added unpredictability.
Article
Computer Science, Information Systems
Hong-wei Xie, Ya-jun Gao, Hao Zhang
Summary: This paper proposes a new image encryption algorithm that utilizes a novel block-level scrambling scheme and bit-level filter diffusion technology. By introducing a new Josephus travel scheme, the diversity of the pseudo-random number generator (PRNG) is increased and the security of the encryption system is improved. In addition, a novel block-level scrambling scheme and bit-vector diffusion operation are used to enhance the encryption efficiency of the algorithm. Numerical simulation and comparison experiments demonstrate that the proposed encryption algorithm has high security, faster encryption speed, and resistance against various attacks.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Sunil Kumar, Dilip Kumar, Naini Singh
Summary: Information security is a vital domain in the modern era, and encryption is a key technique to safeguard data. The Blowfish algorithm is a secure and efficient symmetric key encryption algorithm. However, its limited block size hinders its widespread use. This paper proposes a modified version of the Blowfish algorithm to enable high-speed encryption with a 128-bit block size, making it a potential alternative to AES with less power consumption.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Physics, Multidisciplinary
Zigang Chen, Ji Pan, Yi Yan, Haihua Zhu, Xiaoyong Li
Summary: With the rapid expansion of quantum information and quantum networks, quantum image security research has become a research hotspot in the field of information security. Most encryption algorithms in quantum image processing are independent of color components or position space, resulting in unsatisfactory encryption effects. Therefore, this paper proposes a parallel double scrambling encryption scheme for a multimode quantum image representation (MQIR) image based on random combination, which encrypts the position and pixel value of the image simultaneously and achieves parallel double scrambling of the MQIR image. The experimental results validate the effectiveness and security of the proposed quantum image encryption scheme.
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS
(2022)
Article
Computer Science, Software Engineering
Chunlai Li, Yan Zhang, Haodong Li, Yang Zhou
Summary: This paper presents an image encryption scheme that ensures data and appearance security through inter-intra-block scrambling and weighted diffusion. The scheme utilizes a 2D robust hyper-chaotic map to generate a key stream for encryption, taking the characteristics of the plaintext into account. The compressed image is processed through Huffman coding, then divided into sub-blocks and further permuted through the designed scrambling scheme to improve the scrambling effect. A weighted diffusion method that is closely related to the plaintext and key stream is introduced to diffuse the shuffled image and create a noise-like cipher image for enhanced security. This encryption scheme demonstrates excellent performance through a series of experimental tests and analyses.
Article
Multidisciplinary Sciences
Muhammed J. Al-Muhammed, Ahmad Al-Daraiseh
Summary: The paper introduces an innovative block-based encryption technique that enhances information security by implementing random operations and substitution techniques on block symbols. Experimental results show that the technique passed randomness tests and has a high avalanche effect, effectively boosting the security of the resulting ciphertext.
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING
(2022)
Article
Computer Science, Software Engineering
Xingyuan Wang, Yining Su, Lin Liu, Hao Zhang, Shuhong Di
Summary: This paper proposes a color image encryption algorithm based on Fisher-Yates scrambling and DNA subsequence operation. The algorithm scrambles the color image and manipulates DNA sequences to encrypt the plaintext information.
Article
Chemistry, Multidisciplinary
Dong Li, Jia-Min Wu, Zheng-Hong Liang, Lin-Yue Li, Xiu Dong, Si-Kai Chen, Teng Fu, Xiu-Li Wang, Yu-Zhong Wang, Fei Song
Summary: A synergistic time- and temperature-resolved information coding/decoding solution based on functional photonic inks is demonstrated, enabling high-security multi-channel encryption storage, complex anticounterfeiting, and information interference.
Article
Computer Science, Information Systems
B. K. Shreyamsha Kumar, M. N. S. Swamy, M. Omair Ahmad
MULTIMEDIA TOOLS AND APPLICATIONS
(2019)
Article
Engineering, Electrical & Electronic
S. V. Narasimhan, A. R. Haripriya, B. K. Shreyamsha Kumar
Article
Engineering, Electrical & Electronic
B. K. Shreyamsha Kumar, Chidamber R. Patil
SIGNAL IMAGE AND VIDEO PROCESSING
(2010)
Article
Engineering, Electrical & Electronic
P. Sandeep, B. K. Shreyamsha Kumar, S. V. Narasimhan
SIGNAL IMAGE AND VIDEO PROCESSING
(2013)
Article
Engineering, Electrical & Electronic
B. K. Shreyamsha Kumar
SIGNAL IMAGE AND VIDEO PROCESSING
(2013)
Article
Engineering, Electrical & Electronic
B. K. Shreyamsha Kumar
SIGNAL IMAGE AND VIDEO PROCESSING
(2013)
Article
Engineering, Electrical & Electronic
B. K. Shreyamsha Kumar
SIGNAL IMAGE AND VIDEO PROCESSING
(2013)
Article
Engineering, Electrical & Electronic
B. K. Shreyamsha Kumar
SIGNAL IMAGE AND VIDEO PROCESSING
(2015)
Article
Computer Science, Information Systems
B. K. Shreyamsha Kumar, M. N. S. Swamy, M. Omair Ahmad
MULTIMEDIA TOOLS AND APPLICATIONS
(2020)
Article
Computer Science, Information Systems
B. K. Shreyamsha Kumar, M. N. S. Swamy, M. Omair Ahmad
Proceedings Paper
Computer Science, Theory & Methods
B. K. Shreyamsha Kumar, M. N. S. Swamy, M. Omair Ahmad
2016 IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE)
(2016)
Proceedings Paper
Engineering, Electrical & Electronic
B. K. Shreyamsha Kumar, M. N. S. Swamy, M. Omair Ahmad
2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS)
(2016)
Proceedings Paper
Engineering, Electrical & Electronic
B. K. Shreyamsha Kumar, M. N. S. Swamy, M. Omair Ahmad
2015 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS)
(2015)
Proceedings Paper
Computer Science, Theory & Methods
B. K. Shreyamsha Kumar, M. N. S. Swamy, M. Omair Ahmad
2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE)
(2013)