You are currently on the new version of our website. Access the old version .

3,521 Results Found

  • Article
  • Open Access
1 Citations
2,023 Views
16 Pages

LILP: A Lightweight Enciphering Algorithm to Encrypt Arbitrary-Length Messages

  • Xing Zhang,
  • Jian Chen,
  • Tianning Li,
  • Gang Dai and
  • Changda Wang

7 January 2023

The advancement of the Internet of Things (IoT) has promoted the development of embedded devices. It is important to ensure data transmission security on embedded devices with limited computing power and storage space. However, the traditional block...

  • Article
  • Open Access
5 Citations
2,955 Views
26 Pages

31 March 2021

In this paper, the authors analyze in more details an image encryption scheme, proposed by the authors in their earlier work, which preserves input image statistics and can be used in connection with the JPEG compression standard. The image encryptio...

  • Article
  • Open Access
1 Citations
1,352 Views
18 Pages

Coupling Secret Sharing with Decentralized Server-Aided Encryption in Encrypted Deduplication

  • Chuang Gan,
  • Weichun Wang,
  • Yuchong Hu,
  • Xin Zhao,
  • Shi Dun,
  • Qixiang Xiao,
  • Wei Wang and
  • Huadong Huang

26 January 2025

Outsourcing storage to the cloud can save storage costs and is commonly used in businesses. It should fulfill two major goals: storage efficiency and data confidentiality. Encrypted deduplication can achieve both goals via performing deduplication to...

  • Feature Paper
  • Article
  • Open Access
17 Citations
3,709 Views
15 Pages

Hybrid Encryption Scheme for Medical Imaging Using AutoEncoder and Advanced Encryption Standard

  • Yasmeen Alslman,
  • Eman Alnagi,
  • Ashraf Ahmad,
  • Yousef AbuHour,
  • Remah Younisse and
  • Qasem Abu Al-haija

30 November 2022

Recently, medical image encryption has gained special attention due to the nature and sensitivity of medical data and the lack of effective image encryption using innovative encryption techniques. Several encryption schemes have been recommended and...

  • Review
  • Open Access
17 Citations
7,149 Views
29 Pages

1 July 2023

The widespread adoption of cloud infrastructures has revolutionized data storage and access. However, it has also raised concerns regarding the privacy of sensitive data. To address these concerns, encryption techniques have been widely used. However...

  • Article
  • Open Access
20 Citations
5,972 Views
13 Pages

3 September 2018

With the increasing use of multimedia in communications, the content security of remote-sensing images attracts much attention in both the academia and industry. The Advanced Encryption Standard (AES) is a famous symmetric cryptosystem. A symmetric r...

  • Article
  • Open Access
37 Citations
6,569 Views
17 Pages

15 August 2023

With the rapid development of information technology, the security of images has emerged as a significant area of research. This study presents an algorithm that integrates chaotic image encryption and a convolutional neural network (CNN) to enhance...

  • Article
  • Open Access
1,115 Views
24 Pages

Machine-learning applications are becoming increasingly widespread. However, machine learning is highly dependent on high-quality, large-scale training data. Due to the limitations of data privacy and security, in order to accept more user data, user...

  • Review
  • Open Access
9 Citations
6,738 Views
22 Pages

Attribute-Based Searchable Encryption: A Survey

  • Li Yan,
  • Gaozhou Wang,
  • Tian Yin,
  • Peishun Liu,
  • Hongxin Feng,
  • Wenbin Zhang,
  • Hailin Hu and
  • Fading Pan

With the advent of the big data era, the size and complexity of data continue to increase, which makes the requirement for data privacy and security increasingly urgent. However, traditional encryption methods cannot meet the demand for efficient sea...

  • Article
  • Open Access
4 Citations
5,848 Views
19 Pages

Matrix Encryption Walks for Lightweight Cryptography

  • Aeryn Dunmore,
  • Juliet Samandari and
  • Julian Jang-Jaccard

In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW). We offer example Key Matrices and show the efficiency of the proposed method, which op...

  • Article
  • Open Access
9 Citations
4,989 Views
16 Pages

10 January 2024

In light of the existing security vulnerabilities within IoT publish–subscribe systems, our study introduces an improved end-to-end encryption approach using conditional proxy re-encryption. This method not only overcomes limitations associated...

  • Article
  • Open Access
10 Citations
3,842 Views
24 Pages

Automatic Selective Encryption of DICOM Images

  • Qamar Natsheh,
  • Ana Sălăgean,
  • Diwei Zhou and
  • Eran Edirisinghe

11 April 2023

Securing DICOM images is essential to protect the privacy of patients, especially in the era of telemedicine and eHealth/mHealth. This increases the demand for rapid security. Nevertheless, a limited amount of research work has been conducted to ensu...

  • Article
  • Open Access
1,394 Views
15 Pages

11 May 2025

Homomorphic encryption is an important means for cloud computing to ensure information security when outsourcing data. Among them, threshold fully homomorphic encryption (ThFHE) is a key enabler for homomorphic encryption and, from a wider perspectiv...

  • Review
  • Open Access
5 Citations
5,073 Views
26 Pages

On Multiple Encryption for Public-Key Cryptography

  • Tudor Soroceanu,
  • Nicolas Buchmann and
  • Marian Margraf

Using multiple, individual encryption schemes is a well-established method to increase the overall security of encrypted data. These so-called multiple encryption or hybrid schemes have regained traction in the context of public-key cryptography due...

  • Article
  • Open Access
18 Citations
5,519 Views
20 Pages

Attribute based encryption is a promising technique that achieves flexible and fine-grained data access control over encrypted data, which is very suitable for a secure data sharing environment such as the currently popular cloud computing. However,...

  • Review
  • Open Access
13 Citations
3,469 Views
44 Pages

17 April 2023

Perceptual encryption (PE) hides the identifiable information of an image in such a way that its intrinsic characteristics remain intact. This recognizable perceptual quality can be used to enable computation in the encryption domain. A class of PE a...

  • Article
  • Open Access
33 Citations
9,591 Views
24 Pages

Public Key Encryption with Keyword Search in Cloud: A Survey

  • Yunhong Zhou,
  • Na Li,
  • Yanmei Tian,
  • Dezhi An and
  • Licheng Wang

8 April 2020

With the popularization of cloud computing, many business and individuals prefer to outsource their data to cloud in encrypted form to protect data confidentiality. However, how to search over encrypted data becomes a concern for users. To address th...

  • Article
  • Open Access
18 Citations
4,230 Views
29 Pages

25 October 2023

Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today’s digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA al...

  • Article
  • Open Access
6 Citations
3,390 Views
18 Pages

18 May 2022

Searchable encryption (SE) is one of the effective techniques for searching encrypted data without decrypting it. This technique can provide a secure indexing mechanism for encrypted data and utilize a secure trapdoor to search for the encrypted data...

  • Article
  • Open Access
4 Citations
4,417 Views
18 Pages

18 February 2021

The purpose of this study is to provide an efficient search function over a large amount of encrypted data, where the bit length of each item is several tens of bits. For this purpose, we have improved the existing hybrid homomorphic encryption by en...

  • Article
  • Open Access
130 Citations
11,869 Views
19 Pages

Analytical Study of Hybrid Techniques for Image Encryption and Decryption

  • Chiranji Lal Chowdhary,
  • Pushpam Virenbhai Patel,
  • Krupal Jaysukhbhai Kathrotia,
  • Muhammad Attique,
  • Kumaresan Perumal and
  • Muhammad Fazal Ijaz

10 September 2020

The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encrypt...

  • Article
  • Open Access
35 Citations
10,178 Views
13 Pages

Chaos-Based Cryptography: Text Encryption Using Image Algorithms

  • Marcin Lawnik,
  • Lazaros Moysis and
  • Christos Volos

1 October 2022

Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular stream-encryption algorithms, e.g., textual data, are now rarely considered. This article studies how chaotic image-encryption algorithms can be used to encrypt...

  • Article
  • Open Access
30 Citations
4,403 Views
16 Pages

27 April 2022

This paper proposes an image encryption scheme based on a discrete-time alternating quantum walk (AQW) and the advanced encryption standard (AES). We use quantum properties to improve the AES algorithm, which uses a keystream generator related to AQW...

  • Article
  • Open Access
5 Citations
3,399 Views
14 Pages

Practical Inner Product Encryption with Constant Private Key

  • Yi-Fan Tseng,
  • Zi-Yuan Liu and
  • Raylin Tso

3 December 2020

Inner product encryption, first introduced by Katz et al., is a type of predicate encryption in which a ciphertext and a private key correspond to an attribute vector and a predicate vector, respectively. Only if the attribute and predicate vectors s...

  • Article
  • Open Access
1,490 Views
19 Pages

An Improved Chosen Plaintext Attack on JPEG Encryption

  • Junhui He,
  • Kaitian Gu,
  • Yihan Huang,
  • Yue Li and
  • Xiang Chen

Format-compatible encryption can be used to ensure the security and privacy of JPEG images. Recently, a JPEG image encryption method proved to be secure against known plaintext attacks by employing an adaptive encryption key, which depends on the his...

  • Article
  • Open Access
7 Citations
3,256 Views
15 Pages

Optical Encryption Based on Computer Generated Holograms in Photopolymer

  • Taihui Wu,
  • Jianshe Ma,
  • Chengchen Wang,
  • Haibei Wang,
  • Liangcai Cao and
  • Ping Su

21 April 2021

An optical encryption method based on computer generated holograms printing of photopolymer is presented. Fraunhofer diffraction is performed based on the Gerchberg-Saxton algorithm, and a hologram of the Advanced Encryption Standard encrypted Quick...

  • Article
  • Open Access
803 Views
26 Pages

3 December 2025

Homomorphic encryption enables computations to be performed directly on encrypted data, ensuring data confidentiality even in untrusted or distributed environments. Although this approach provides strong theoretical security, its practical adoption r...

  • Article
  • Open Access
2 Citations
3,057 Views
23 Pages

6 November 2022

The detection of malicious encrypted traffic is an important part of modern network security research. The producers of the current malware do not pay attention to the fact that malicious encrypted traffic can also be detected; they do not construct...

  • Review
  • Open Access
201 Citations
31,516 Views
39 Pages

5 June 2023

Chaos has been one of the most effective cryptographic sources since it was first used in image-encryption algorithms. This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symme...

  • Review
  • Open Access
63 Citations
12,636 Views
38 Pages

Recently, many researchers have been interested in the application of chaos in cryptography. Specifically, numerous research works have been focusing on chaotic image encryption. A comprehensive survey can highlight existing trends and shed light on...

  • Article
  • Open Access
2 Citations
4,735 Views
22 Pages

Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme

  • M A Manazir Ahsan,
  • Mohd Yamani Idna Bin Idris,
  • Ainuddin Wahid Bin Abdul Wahab,
  • Ihsan Ali,
  • Nawsher Khan,
  • Mohammed Ali Al-Garwi and
  • Atiq Ur Rahman

15 May 2018

Cloud computing is intensifying the necessity for searchable encryption (SE) for data protection in cloud storage. SE encrypts data to preserve its confidentiality while offering a secure search facility on the encrypted data. Typical index-based SEs...

  • Proceeding Paper
  • Open Access
2,873 Views
8 Pages

Current encryption technologies mostly rely on complex algorithms or difficult mathematical problems to improve security. Therefore, it is difficult for these encryption technologies to possess both high security and high efficiency, which are two pr...

  • Article
  • Open Access
4 Citations
12,372 Views
17 Pages

Public cloud service providers provide an infrastructure that gives businesses and individuals access to computing power and storage space on a pay-as-you-go basis. This allows these entities to bypass the usual costs associated with having their own...

  • Article
  • Open Access
3 Citations
2,691 Views
15 Pages

Secure Control of Linear Controllers Using Fully Homomorphic Encryption

  • Jingshan Pan,
  • Tongtong Sui,
  • Wen Liu,
  • Jizhi Wang,
  • Lingrui Kong,
  • Yue Zhao and
  • Zhiqiang Wei

7 December 2023

In actual operation, there are security risks to the data of the network control system, mainly in the form of possible eavesdropping of signals in the transmission channel and parameters in the controller leading to data leakage. In this paper, we p...

  • Article
  • Open Access
1,127 Views
18 Pages

We propose a new framework for compile-time ciphertext synthesis in fully homomorphic encryption (FHE) systems. Instead of invoking encryption algorithms at runtime, our method synthesizes ciphertexts from precomputed encrypted basis vectors using on...

  • Article
  • Open Access
4 Citations
2,277 Views
27 Pages

6 September 2023

To protect the privacy of cloud data, encryption before uploading provides a solution. However, searching for target data in ciphertext takes effort. Therefore, searchable encryption has become an important research topic. On the other hand, since th...

  • Feature Paper
  • Review
  • Open Access
2 Citations
4,203 Views
37 Pages

Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives

  • Siddhartha Siddhiprada Bhoi,
  • Arathi Arakala,
  • Amy Beth Corman and
  • Asha Rao

Homomorphic Encryption (HE) allows secure and privacy-protected computation on encrypted data without the need to decrypt it. Since Shor’s algorithm rendered prime factorisation and discrete logarithm-based ciphers insecure with quantum computa...

  • Article
  • Open Access
1 Citations
3,712 Views
8 Pages

An Algorithm Based on GSVD for Image Encryption

  • Mohammed Abdul Hameed Jassim Al-Kufi,
  • Hayder Raheem Hashim,
  • Ameer Mohammed Hussein and
  • Hind Rustum Mohammed

This paper represents a new image encryption algorithm based on modifying generalized singular value decomposition (GSVD) by decomposing the plain-image into two segments using GSVD with an exchanged key-image to produce the cipher-image. The exchang...

  • Article
  • Open Access
50 Citations
7,733 Views
17 Pages

Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms

  • Rafik Hamza,
  • Alzubair Hassan,
  • Awad Ali,
  • Mohammed Bakri Bashir,
  • Samar M. Alqhtani,
  • Tawfeeg Mohmmed Tawfeeg and
  • Adil Yousif

6 April 2022

Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) algorithm, cannot perform computational operations on encrypted data without f...

  • Article
  • Open Access
1 Citations
1,535 Views
15 Pages

Image Forensics in the Encrypted Domain

  • Yongqiang Yu,
  • Yuliang Lu,
  • Longlong Li,
  • Feng Chen and
  • Xuehu Yan

24 October 2024

Encryption techniques used by forgers have thrown out a big possible challenge to forensics. Most traditional forensic tools will fail to detect the forged multimedia, which has been encrypted. Thus, image forensics in the encrypted domain (IFED) is...

  • Article
  • Open Access
14 Citations
6,673 Views
13 Pages

24 August 2023

With the increasing number of edge devices connecting to the cloud for storage and analysis, concerns about security and data privacy have become more prominent. Homomorphic encryption (HE) provides a promising solution by not only preserving data pr...

  • Article
  • Open Access
80 Citations
5,990 Views
23 Pages

A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications

  • Ibrahim Yasser,
  • Mohamed A. Mohamed,
  • Ahmed S. Samra and
  • Fahmi Khalifa

4 November 2020

Chaos-based encryption has shown an increasingly important and dominant role in modern multimedia cryptography compared with traditional algorithms. This work proposes novel chaotic-based multimedia encryption schemes utilizing 2D alteration models f...

  • Article
  • Open Access
16 Citations
4,264 Views
19 Pages

23 March 2023

This paper evaluates the effects of JPEG compression on image classification using the Vision Transformer (ViT). In recent years, many studies have been carried out to classify images in the encrypted domain for privacy preservation. Previously, the...

  • Article
  • Open Access
437 Views
23 Pages

Super Encryption Standard (SES): A Key-Dependent Block Cipher for Image Encryption

  • Mohammed Abbas Fadhil Al-Husainy,
  • Bassam Al-Shargabi and
  • Omar Sabri

19 December 2025

Data encryption is a core mechanism in modern security services for protecting confidential data at rest and in transit. This work introduces the Super Encryption Standard (SES), a symmetric block cipher that follows the overall workflow of the Advan...

  • Article
  • Open Access
14 Citations
3,214 Views
18 Pages

20 September 2022

This paper proposes a novel reversible data-hiding method in encrypted images to achieve both a high hiding capacity and good compression performance. The proposed method can also decrypt marked encrypted images without data extraction, so marked ima...

  • Article
  • Open Access
1 Citations
3,701 Views
25 Pages

In public key broadcast encryption, anyone can securely transmit a message to a group of receivers such that privileged users can decrypt it. The three important parameters of the broadcast encryption scheme are the length of the ciphertext, the size...

  • Article
  • Open Access
21 Citations
3,527 Views
18 Pages

A Multiple-Medical-Image Encryption Method Based on SHA-256 and DNA Encoding

  • Junfeng Wu,
  • Jialu Zhang,
  • Dong Liu and
  • Xiaofeng Wang

3 June 2023

Ensuring the privacy and secrecy of digital medical images has become a pressing issue as a result of the quick development of smart medical technology and the exponential growth in the quantity of medical images transmitted and stored in networks. T...

  • Article
  • Open Access
7 Citations
2,870 Views
13 Pages

21 September 2022

Holographic communication is a three-dimensional (3D) video communication technology based on computer-generated holograms (CGHs) which has the potential to give users a more realistic visual perception. As this is an emerging field, the encrypted en...

  • Article
  • Open Access
19 Citations
3,877 Views
19 Pages

26 August 2021

Several emerging areas like the Internet of Things, sensor networks, healthcare and distributed networks feature resource-constrained devices that share secure and privacy-preserving data to accomplish some goal. The majority of standard cryptographi...

of 71