Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
4,249
result(s) for
"image encryption"
Sort by:
Handbook of image-based security techniques
This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. The first section explores basic to advanced concepts of visual cryptography (VC). The second section covers Digital Image Watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The final section analyzes Steganography, including the notion, terminology and building blocks of steganographic communication. The book includes many examples and applications, as well as implementation using MATLAB-- Provided by publisher.
Chaos-Based Image Encryption: Review, Application, and Challenges
2023
Chaos has been one of the most effective cryptographic sources since it was first used in image-encryption algorithms. This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symmetric and asymmetric algorithms, block ciphers and stream ciphers, and integration with other technologies. The unique attributes of chaos, such as sensitivity to initial conditions, topological transitivity, and pseudo-randomness, are conducive to cross-referencing with other disciplines and improving image-encryption methods. Additionally, this paper covers practical application scenarios and current challenges of chaotic image encryption, thereby encouraging researchers to continue developing and complementing existing situations, and may also serve as a basis of future development prospects for chaos-based image encryption.
Journal Article
Multiple-image encryption algorithm based on DNA encoding and chaotic system
2019
Under the Internet platform, the digital images are widely applied in many fields at present. To protect the content of multiple images, a new multiple-image encryption (MIE) algorithm based on Deoxyribonucleic acid (DNA) encoding and chaotic system is proposed in this paper. Different from the traditional image encryption algorithms, the permutation and diffusion of the new algorithm is manipulated on the three-dimensional DNA matrix. Firstly, k plain images are combined into a big image which is then encoded with the DNA codes; secondly, the big image is scrambled by a chaotic sequence; thirdly, the big image is segmented into k images with the same size of the plain images, and they are diffused by a chaotic image encoded with the DNA codes; finally, k encrypted images are obtained after the DNA decoding. SHA-256 hash value of the plain images is employed to calculate the initial values and control parameters of the chaotic systems. Experimental results and algorithm analyses show that the new encryption algorithm has excellent encryption effect and high security.
Journal Article
A novel infinitely coexisting attractor and its application in image encryption
2024
The security performance of image encryption schemes based on chaotic systems has been greatly improved. Specifically, those chaotic systems with high-dimension or special attractors have shown more benefits for enhancing performance. By introducing the tangent function, a 4-dimensional chaotic system with infinite coexisting attractors is constructed. And the dynamical behaviors are analyzed through phase diagrams, bifurcation diagrams, Lyapunov exponent spectrum and spectral entropy complexity diagram. The results demonstrate that the system exhibits self-replication with respect to the initial value
y
0
and possesses rich dynamical properties, such as infinite coexisting attractors, sensitivity to initial values and period-doubling bifurcation. These characteristics make it suitable for chaotic cryptography applications. Subsequently, a lossless double color image encryption scheme is designed based on the constructed system. The scheme adopts a diffusion-scrambling-diffusion processing method, and cleverly utilizes the information of the original plaintext image in the scrambling process, which significantly enhances the ability to resist known plaintext attacks or selected plaintext attacks. The experimental results verify that the designed algorithm not only effectively encrypts color and grayscale images, but also allows for encryption images of any size. Moreover, the algorithm implementation process is efficient and ensures high security performance, effectively resisting differential attacks, rotation attacks and cropping attacks. This research exploration on the chaotic characteristics of the nonlinear high-dimensional system and its application in image encryption is expected to provide theoretical guidance in the field of secure communication.
Journal Article
Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap
by
Behrouz Zolfaghari
,
Takeshi Koshiba
in
Algorithms
,
Applied mathematics. Quantitative methods
,
chaos
2022
Recently, many researchers have been interested in the application of chaos in cryptography. Specifically, numerous research works have been focusing on chaotic image encryption. A comprehensive survey can highlight existing trends and shed light on less-studied topics in the area of chaotic image encryption. In addition to such a survey, this paper studies the main challenges in this field, establishes an ecosystem for chaotic image encryption, and develops a future roadmap for further research in this area.
Journal Article
Optimized Homomorphic Encryption (OHE) algorithms for protecting sensitive image data in the cloud computing environment
by
Soni, Sunita
,
Dewangan, Revati Raman
,
Mishal, Ashish
in
Access control
,
Algorithms
,
Artificial Intelligence
2024
This research aims to enhance photo encryption security by developing a sophisticated technique. This method uses homomorphic encryption to address challenges in encrypting visible spectrum pictures. Each red–green–blue (RGB) channel of the image is divided into smaller sub-values, encrypted separately using an optimized homomorphic encryption algorithm, and then combined for further encryption. Additionally, a novel approach involves combining surrounding pixels to embed extra data during encryption. The process allows for compression and decompression of encrypted components for easier storage or transmission. After decryption, the initial pixel values are recovered, removing any unnecessary data and condensing each channel's pixel intensity into just two sub-values. Multiple security evaluations confirm the method's robustness and resistance, emphasizing its strong security features for encrypted images.
Journal Article
A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding
2023
Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. The lightweight multiple-image encryption approach for medical images that is suggested in this research can encrypt/decrypt any number of medical photos of varied sizes with just one encryption operation and has a computational cost that is similar to encrypting a single image. The plaintext images with different sizes are filled at the right and bottom of the image to ensure that the size of all plaintext images is uniform; then, all the filled images are stacked to obtain a superimposed image. The initial key, which is generated using the SHA-256 technique, is then used as the starting value of the linear congruence algorithm to create the encryption key sequence. The cipher picture is then created by encrypting the superimposed image with the encryption key and DNA encoding. The algorithm can be made even more secure by implementing a decryption mechanism that decrypts the image independently in order to reduce the possibility of information leaking during the decryption process. The outcomes of the simulation experiment demonstrate the algorithm’s strong security and resistance to interference such as noise pollution and lost image content.
Journal Article
An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations
by
Setiadi, De Rosal Ignatius Moses
,
Rijati, Nova
in
Algorithms
,
chaotic image encryption
,
Chi-square test
2023
Confusion, diffusion, and encryption keys affect the quality of image encryption. This research proposes combining bit- and pixel-level permutation and substitution methods based on three advanced chaotic logistic map methods. The three chaotic methods are the 2D Logistic-adjusted-Sine map (2D-LASM), the 2D Logistic-sine-coupling map (2D-LSCM), and the 2D Logistic ICMIC cascade map (2D-LICM). The encryption method’s design consists of six stages of encryption, involving permutation operations based on chaotic order, substitution based on modulus and bitXOR, and hash functions. Hash functions are employed to enhance key space and key sensitivity quality. Several testing tools are utilized to assess encryption performance, including histogram and chi-square analysis, information entropy, correlation of adjacent pixels, differential analysis, key sensitivity and key space analysis, data loss and noise attacks, NIST randomness tests, and TestU01. Compared to using a single 2D logistic map, the amalgamation of bit-level and pixel-level encryption and the utilization of three 2D cascade logistic maps has improved encryption security performance. This method successfully passes the NIST, TestU01, and chi-square tests. Furthermore, it outperforms the previous method regarding correlation, information entropy, NPCR, and UACI tests.
Journal Article
Enhancing Post-Quantum Information Security: A Novel Two-Dimensional Chaotic System for Quantum Image Encryption
2025
Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing. To address these concerns, this paper presents the mathematical and computer modeling of a novel two-dimensional (2D) chaotic system for secure key generation in quantum image encryption (QIE). The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence, named as Trigonometric-Rational-Saturation (TRS) map. Through rigorous mathematical analysis and computational simulations, the map is extensively evaluated for bifurcation behaviour, chaotic trajectories, and Lyapunov exponents. The security evaluation validates the map’s non-linearity, unpredictability, and sensitive dependence on initial conditions. In addition, the proposed TRS map has further been tested by integrating it in a QIE scheme. The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation (NEQR) technique, the TRS map is used for the generation of secure diffusion key, which is XOR-ed with the quantum-ready image to obtain the encrypted images. The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks. The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62% and 33.47% results for Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI). The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats, making it suitable for secure image encryption in IoT and edge-based applications.
Journal Article
Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map
2018
To enhance the encryption proficiency and encourage the protected transmission of multiple images, the current work introduces an encryption algorithm for multiple images using the combination of mixed image elements (MIES) and a two-dimensional economic map. Firstly, the original images are grouped into one big image that is split into many pure image elements (PIES); secondly, the logistic map is used to shuffle the PIES; thirdly, it is confused with the sequence produced by the two-dimensional economic map to get MIES; finally, the MIES are gathered into a big encrypted image that is split into many images of the same size as the original images. The proposed algorithm includes a huge number key size space, and this makes the algorithm secure against hackers. Even more, the encryption results obtained by the proposed algorithm outperform existing algorithms in the literature. A comparison between the proposed algorithm and similar algorithms is made. The analysis of the experimental results and the proposed algorithm shows that the proposed algorithm is efficient and secure.
Journal Article