Article
Computer Science, Artificial Intelligence
Jasra Bhat, Ayaz Hassan Moon
Summary: This paper proposes a novel image encryption and authentication scheme utilizing DNA encoding, hyperchaotic system, and elliptic curve cryptography, which provides high encryption security and computational efficiency. By permutating image information at bit-level and block-level, the scheme protects image data from various attacks.
EXPERT SYSTEMS WITH APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Temadher Alassiry Al-Maadeed, Iqtadar Hussain, Amir Anees, Muhammad Tahir Mustafa
Summary: This paper presents an image encryption algorithm based on chaotic maps and algebraic structure to enhance robustness and security. By combining Lorenz chaotic system, primitive irreducible polynomial substitution box, and chaotic maps, efficient encryption of images is achieved.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Engineering, Mechanical
Wanqing Wu, Qiao Wang
Summary: Cryptanalysis plays a crucial role in the design of image cryptographic systems. In this study, a two-round image cryptographic system was analyzed and found to have vulnerabilities that allowed successful decryption of encrypted images through chosen-plaintext attacks. The encryption scheme was improved to enhance security, and the improved system demonstrated better resilience against chosen-plaintext attacks while maintaining the same encryption performance as the original scheme.
NONLINEAR DYNAMICS
(2023)
Article
Computer Science, Information Systems
Heping Wen, Ruiting Chen, Jieyi Yang, Tianle Zheng, Jiahao Wu, Wenxing Lin, Huilin Jian, Yiting Lin, Linchao Ma, Zhen Liu, Chongfu Zhang
Summary: This study conducts a cryptographic security analysis on a color image encryption algorithm, finding that the algorithm can be completely cracked by a chosen-plaintext attack method due to equivalent keys and simplified linear transformation. Experimental results confirm the effectiveness and efficiency of our method.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Physics, Multidisciplinary
Heping Wen, Chongfu Zhang, Lan Huang, Juxin Ke, Dongqing Xiong
Summary: Fractional-order chaos is complex and has attracted attention in secure communication applications. While a color image encryption algorithm using a fractional-order hyperchaotic system was found to be cryptographically secure, it was also discovered to have inherent security flaws that can be exploited through a chosen-plaintext attack method.
Article
Computer Science, Information Systems
Heping Wen, Yiting Lin
Summary: ICIC-DNA is an improved color image cipher based on chaotic systems and DNA operations. However, after cryptanalysis, it was found that ICIC-DNA has serious security flaws, including the existence of equivalent keys and vulnerabilities in the substitution and permutation processes.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2023)
Article
Computer Science, Information Systems
Qingfeng Li, Lei Chen
Summary: This paper proposes an image encryption algorithm based on a 6D high-dimensional chaotic system and DNA encoding technique. The algorithm diffuses and shuffles the original image sequences using random chaos sequences, both on the original level and on the DNA level. The experimental results show that the proposed algorithm has advantages in image entropy, pixel correlation, image complexity, and robustness against geometric and cut-off attacks compared to the reference algorithm.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Mohamed Gabr, Yousef Korayem, Yen-Lin Chen, Por Lip Yee, Chin Soon Ku, Wassim Alexan
Summary: This research proposes a novel image encryption algorithm that combines unique image transformation techniques with the principles of chaotic and hyper-chaotic systems. The algorithm carries out rescaling, rotation, and randomization on the target image using the unpredictability and hyper-chaotic nature of the Chua and Chen systems. It has a large key space, high efficiency, and robust defenses, making it suitable for secure communication, data storage, and multimedia transmission.
Article
Computer Science, Information Systems
Talal Bonny, Wafaa Al Nassan, Abdullatif Baba
Summary: This paper presents a new, highly secure chaos-based secure communication system that combines a conventional cryptography algorithm with two levels of chaotic masking technique. The system utilizes the characteristic of a unified hyper-chaotic system to generate three different types of attractors. Testing methods such as power spectral density, spectrogram, and histogram analysis are used to evaluate the algorithm's quality in time, frequency, and statistics domains, and the results show the system's high efficiency and robustness against cryptographic attacks.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Engineering, Mechanical
Xudong Liu, Xiaojun Tong, Zhu Wang, Miao Zhang
Summary: This article proposes an image encryption algorithm based on chaotic systems, and constructs the encryption system through the chaotic system generation algorithm and chaotic S-box generation algorithm. The experimental results show that the algorithm has good cryptographic properties.
NONLINEAR DYNAMICS
(2022)
Article
Physics, Multidisciplinary
Jilei Sun
Summary: This paper proposes an associated color chaotic image encryption algorithm based on a two-dimensional chaotic system and random XOR diffusion. The algorithm generates initial values and key streams, processes color image channels into matrices, and then performs color image scrambling and random XOR diffusion based on the 2D-LSCM mathematical expression.
Article
Computer Science, Information Systems
Aasawari Sahasrabuddhe, Dolendro Singh Laiphrakpam
Summary: The paper introduces a cryptographic algorithm based on chaos theory and elliptic curve Elgamal cryptosystem for securing multiple digital images over the network. Experimental results show that the algorithm has a large keyspace, desirable statistical properties of cipher data, and resistance to attacks.
INFORMATION SCIENCES
(2021)
Article
Physics, Multidisciplinary
M. Emin Sahin
Summary: This paper proposes an image encryption model that utilizes different chaotic systems, including the logistic map, Lorenz chaotic system, and memristor-based hyperchaotic system, combined with AES and RSA encryption algorithms. The proposed scheme applies bit-based pixel diffusion and confusion techniques to enhance the security of encrypted images. Statistical and security tests are conducted to compare the performance of different encryption systems and algorithms, and the experimental results demonstrate the effectiveness of the proposed image encryption scheme in terms of security, speed, and reliability, offering valuable insights for future chaos-based encryption systems.
Article
Mathematics
Shuiyuan Huang, Gengsheng Deng, Lingfeng Liu, Xiangjun Li
Summary: This study proposes a new delayed coupling method to improve the chaotic characteristics of chaotic maps, and further introduces an image encryption algorithm based on this method, which shows a high level of security and competitiveness compared to other encryption algorithms.
Article
Engineering, Mechanical
Zezong Zhang, Jianeng Tang, Hui Ni, Tingting Huang
Summary: In this paper, a universal two-dimensional (2D) enhanced cosine coupled model (2D-ECCM) is designed for constructing new chaotic systems. Two new maps, 2D Logistic-sine coupled map (2D-NLSCM) and 2D cubic-tent coupled map (2D-NCTCM), generated using 2D-ECCM, show better chaotic behaviors compared to existing 2D chaos. An image adaptive encryption algorithm utilizing 2D-NLSCM is proposed, incorporating adaptive scrambling and bidirectional-sequential diffusion methods for pixel manipulation. The algorithm proves its superior encryption efficiency and resistance against common cryptanalytic attacks with an average information entropy of 7.9988 and average chi-square of 238.3495.
NONLINEAR DYNAMICS
(2023)
Article
Computer Science, Hardware & Architecture
Kai-Hsiang Tsao, Shyong-Jian Shyu, Chih-Hung Lin, Yao-Sheng Lee, Tzung-Her Chen
Article
Computer Science, Information Systems
Chih-Hung Lin, Yao-Sheng Lee, Tzung-Her Chen
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION
(2015)
Article
Computer Science, Information Systems
Fuh-Gwo Jeng, Yan-Ting Wu, Tzung-Her Chen
MULTIMEDIA TOOLS AND APPLICATIONS
(2016)
Article
Computer Science, Information Systems
Jyun-Ci Huang, Fuh-Gwo Jeng, Tzung-Her Chen
MULTIMEDIA TOOLS AND APPLICATIONS
(2017)
Article
Engineering, Electrical & Electronic
Tzung-Her Chen, Yao-Sheng Lee, Chih-Hung Lin
SIGNAL PROCESSING-IMAGE COMMUNICATION
(2016)
Article
Computer Science, Information Systems
Tzung-Her Chen, Kai-Siang Lin, Chih-Hung Lin
MULTIMEDIA TOOLS AND APPLICATIONS
(2018)
Article
Computer Science, Information Systems
Tzung-Her Chen, Tzu-Ching Chang
MULTIMEDIA TOOLS AND APPLICATIONS
(2018)
Article
Computer Science, Information Systems
Hsing-Bai Chen, Wei-Bin Lee, Tzung-Her Chen
MULTIMEDIA TOOLS AND APPLICATIONS
(2018)
Article
Computer Science, Information Systems
Bing-Jian Wang, Tzer-Shyong Chen, Fuh-Gwo Jeng, Tzung-Her Chen
MULTIMEDIA TOOLS AND APPLICATIONS
(2019)
Article
Engineering, Electrical & Electronic
Wei-Bin Lee, Hsing-Bai Chen, Shun-Shyan Chang, Tzung-Her Chen
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
(2019)
Article
Computer Science, Information Systems
Tzung-Her Chen, Xi-Wen Wu
MULTIMEDIA TOOLS AND APPLICATIONS
(2020)
Article
Computer Science, Information Systems
Tzung-Her Chen, Tzu-Ching Chang, Ting-Le Zhu
Summary: The newly proposed image secret sharing scheme based on the POB number system offers advantages including high security, lossless reconstruction, high integrity protection, high detection accuracy, and low time complexity.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Tzung-Her Chen, Jing-Ya Yan
Summary: The paper proposes a commutative HDR image encryption and authentication scheme to protect OpenEXR HDR images. By dividing HDR pixel values into confidentiality and integrity parts, the scheme ensures the security and integrity of the images. Experimental results and theoretical analyses confirm the effectiveness and feasibility of the proposed scheme.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Xi-Wen Wu, Tzung-Her Chen
Summary: More and more VC schemes are incorporating computational operations like XOR in the secret decoding phase. This paper identifies shortcomings in Singh et al.'s XOR-based VC scheme and proposes security enhancements.
MULTIMEDIA TOOLS AND APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Chien-Ding Lee, Jhih-Hong Li, Tzung-Her Chen
Summary: In this paper, a blockchain-enabled authenticated conserved data aggregation scheme is proposed to balance security concerns and the computational cost of the smart grid. The scheme integrates efficient cryptographic algorithms, incorporates a blockchain system for decentralization, is scalable, combines power data and signature in aggregational operations, and enhances the privacy protection of blockchain applications in the smart grid.
Article
Engineering, Electrical & Electronic
Xueyu Han, Ishtiaq Rasool Khan, Susanto Rahardja
Summary: This paper proposes a clustering-based TMO method by embedding human visual system models to adapt to different HDR scenes. The method reduces computational complexity using a hierarchical scheme for clustering and enhances local contrast by superimposing details and controlling color saturation by limiting the adaptive saturation parameter. Experimental results show that the proposed method achieves improvements in generating high quality tone-mapped images compared to competing methods.
SIGNAL PROCESSING-IMAGE COMMUNICATION
(2024)
Article
Engineering, Electrical & Electronic
Zuopeng Zhao, Tianci Zheng, Kai Hao, Junjie Xu, Shuya Cui, Xiaofeng Liu, Guangming Zhao, Jie Zhou, Chen He
Summary: The research team developed a handheld phone detection network called YOLO-PAI, which successfully achieved real-time detection and underwent testing under various conditions. Experimental results show that YOLO-PAI reduces network structure parameters and computational costs while maintaining accuracy, outperforming other popular networks in terms of speed and accuracy.
SIGNAL PROCESSING-IMAGE COMMUNICATION
(2024)
Article
Engineering, Electrical & Electronic
Vivek Sharma, Ashish Kumar Tripathi, Purva Daga, M. Nidhi, Himanshu Mittal
Summary: In this study, a novel ClGan method is proposed for automated plant disease detection. The method reduces the number of parameters and addresses the issues of vanishing gradients, training instability, and non-convergence by using an encoder-decoder network. Additionally, an improved loss function is introduced to stabilize the learning process and optimize weights effectively. Furthermore, a new plant leaf classification method called ClGanNet is introduced, achieving 99.97% training accuracy and 99.04% testing accuracy using the least number of parameters.
SIGNAL PROCESSING-IMAGE COMMUNICATION
(2024)
Article
Engineering, Electrical & Electronic
Seongeun Kim, Chang-Ock Lee
Summary: This article introduces a method for segmenting individual teeth in human teeth images by using deep neural networks to obtain pseudo edge-regions and applying active contour models for segmentation.
SIGNAL PROCESSING-IMAGE COMMUNICATION
(2024)