Skip to Content
You are currently on the new version of our website. Access the old version .

122 Results Found

  • Article
  • Open Access
41 Citations
4,402 Views
34 Pages

Medical Images Encryption Based on Adaptive-Robust Multi-Mode Synchronization of Chen Hyper-Chaotic Systems

  • Ali Akbar Kekha Javan,
  • Mahboobeh Jafari,
  • Afshin Shoeibi,
  • Assef Zare,
  • Marjane Khodatars,
  • Navid Ghassemi,
  • Roohallah Alizadehsani and
  • Juan Manuel Gorriz

7 June 2021

In this paper, a novel medical image encryption method based on multi-mode synchronization of hyper-chaotic systems is presented. The synchronization of hyper-chaotic systems is of great significance in secure communication tasks such as encryption o...

  • Article
  • Open Access
1,447 Views
25 Pages

11 December 2024

Security is one of the increasingly significant issues given advancements in technology that harness data from multiple devices such as the internet of medical devices. While protecting data from unauthorized user access, several techniques are used...

  • Article
  • Open Access
6 Citations
3,096 Views
22 Pages

Secure Data Transmission and Image Encryption Based on a Digital-Redesign Sliding Mode Chaos Synchronization

  • Jiunn-Shiou Fang,
  • Jason Sheng-Hong Tsai,
  • Jun-Juh Yan,
  • Li-Huseh Chiang and
  • Shu-Mei Guo

5 February 2022

In this paper, a novel image encryption algorithm based on chaotic synchronization is proposed. First, a digital-redesign sliding mode controller (SMC) is developed to guarantee the chaos synchronization. The digital redesign method makes it possible...

  • Article
  • Open Access
252 Views
33 Pages

Communication is defined as the process of transferring data and exchanging information between interconnected systems. Due to the increasing reliance on digital infrastructures by the military, financial, and healthcare sectors, it is important to e...

  • Article
  • Open Access
32 Citations
12,992 Views
16 Pages

A Fast Text-to-Image Encryption-Decryption Algorithm for Secure Network Communication

  • Noor Sattar Noor,
  • Dalal Abdulmohsin Hammood,
  • Ali Al-Naji and
  • Javaan Chahl

Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection. To protect data from unauthorized disclosure and modification, a secure algorit...

  • Article
  • Open Access
49 Citations
7,774 Views
11 Pages

23 May 2018

Because of the ubiquity of Internet of Things (IoT) devices, the power consumption and security of IoT systems have become very important issues. Advanced Encryption Standard (AES) is a block cipher algorithm is commonly used in IoT devices. In this...

  • Article
  • Open Access
42 Citations
6,080 Views
16 Pages

2 February 2021

This study aimed to design chaos-based synchronized dynamic keys and develop an improved chaos-based advanced encryption standard (AES) algorithm with the proposed synchronized random keys. First, based on sliding mode control (SMC) technology, a rip...

  • Article
  • Open Access
850 Views
9 Pages

Dual-Wavelength Phase Transition Random Lasers with Switchable Modes

  • Ran Zhu,
  • Junhua Tong,
  • Xiaoyu Shi,
  • Chengyou Lin and
  • Tianrui Zhai

30 September 2025

Multi-wavelength random lasers with switchable modes have advantages in the fields of novel light source and information security. Here, we propose a dual-wavelength phase transition random laser, which can modulate lasing modes arbitrarily assisted...

  • Article
  • Open Access
11 Citations
4,278 Views
16 Pages

Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things

  • Hyeokdong Kwon,
  • SangWoo An,
  • YoungBeom Kim,
  • Hyunji Kim,
  • Seung Ju Choi,
  • Kyoungbae Jang,
  • Jaehoon Park,
  • Hyunjun Kim,
  • Seog Chung Seo and
  • Hwajeong Seo

22 September 2020

As the technology of Internet of Things (IoT) evolves, abundant data is generated from sensor nodes and exchanged between them. For this reason, efficient encryption is required to keep data in secret. Since low-end IoT devices have limited computati...

  • Article
  • Open Access
14 Citations
7,325 Views
14 Pages

PAGE—Practical AES-GCM Encryption for Low-End Microcontrollers

  • Kyungho Kim,
  • Seungju Choi,
  • Hyeokdong Kwon,
  • Hyunjun Kim,
  • Zhe Liu and
  • Hwajeong Seo

30 April 2020

An optimized AES (Advanced Encryption Standard) implementation of Galois Counter Mode of operation (GCM) on low-end microcontrollers is presented in this paper. Two optimization methods are applied to proposed implementations. First, the AES counter...

  • Article
  • Open Access
3 Citations
3,018 Views
24 Pages

Matrix Power Function Based Block Cipher Operating in CBC Mode

  • Lina Dindiene,
  • Aleksejus Mihalkovich,
  • Kestutis Luksys and
  • Eligijus Sakalauskas

18 June 2022

In our previous study, we proposed a perfectly secure Shannon cipher based on the so-called matrix power function. There we also introduced a concept of single round symmetric encryption, i.e., we used the matrix power function together with some rat...

  • Article
  • Open Access
1 Citations
1,932 Views
16 Pages

An MLWE-Based Cut-and-Choose Oblivious Transfer Protocol

  • Yongli Tang,
  • Menghao Guo,
  • Yachao Huo,
  • Zongqu Zhao,
  • Jinxia Yu and
  • Baodong Qin

16 September 2024

The existing lattice-based cut-and-choose oblivious transfer protocol is constructed based on the learning-with-errors (LWE) problem, which generally has the problem of inefficiency. An efficient cut-and-choose oblivious transfer protocol is proposed...

  • Article
  • Open Access
3 Citations
2,306 Views
16 Pages

1 April 2024

With the rapid development of the Internet of Things (IoT) in recent years, many IoT devices use communication systems to transmit data. Data packets are inevitably at risk of tampering during data transmission, which can lead to information errors a...

  • Article
  • Open Access
1,466 Views
17 Pages

24 January 2024

In this paper, we propose an asymmetric cryptosystem based on dynamic foveated imaging and bidimensional empirical mode decomposition (BEMD). Firstly, a novel dynamic foveated imaging algorithm is developed to transform a plaintext image to a globall...

  • Article
  • Open Access
12 Citations
3,090 Views
11 Pages

Pairwise Coded mCAP with Chaotic Dual-Mode Index Modulation for Secure Bandlimited VLC Systems

  • Yungui Nie,
  • Wei Zhang,
  • Yanbing Yang,
  • Xiong Deng,
  • Min Liu and
  • Chen Chen

27 February 2022

In this paper, for the first time, we propose and experimentally demonstrate a novel pairwise coding (PWC)-based multiband carrierless amplitude and phase (mCAP) modulation with chaotic dual-mode index modulation (DM) for secure bandlimited visible l...

  • Article
  • Open Access
1 Citations
1,459 Views
14 Pages

Construction of Heterogeneous Aggregation-Induced Emission Microspheres with Enhanced Multi-Mode Information Encryption

  • Zhiwei Wu,
  • Weiqin Yu,
  • Fenghao Luo,
  • Yue Jin,
  • Ligou Pan,
  • Qianjun Deng,
  • Qing Wang and
  • Mingguang Yu

11 December 2024

Traditional organic light-emitting materials hinder their anti-counterfeiting application in solid state due to their aggregation-caused quenching effect. A facile and straightforward method was reported to introduce AIE molecules into microspheres a...

  • Article
  • Open Access
8 Citations
4,834 Views
14 Pages

18 April 2018

In this paper, a three-dimensional chaotic system with a hidden attractor is introduced. The complex dynamic behaviors of the system are analyzed with a Poincaré cross section, and the equilibria and initial value sensitivity are analyzed by t...

  • Article
  • Open Access
642 Views
24 Pages

This paper innovatively achieves finite-time modified function projection synchronization (MFPS) for different fractional-order chaotic systems. By leveraging the advantages of radial basis function (RBF) neural networks in nonlinear approximation, t...

  • Article
  • Open Access
2 Citations
3,303 Views
16 Pages

19 April 2020

Binary field ( B F ) multiplication is a basic and important operation for widely used crypto algorithms such as the GHASH function of GCM (Galois/Counter Mode) mode and NIST-compliant binary Elliptic Curve Cryptosystems (ECCs). Recently, Seo e...

  • Article
  • Open Access
45 Citations
6,680 Views
15 Pages

A Selective Video Encryption Scheme Based on Coding Characteristics

  • Shuli Cheng,
  • Liejun Wang,
  • Naixiang Ao and
  • Qingqing Han

26 February 2020

The protection of video data has become a hot topic of research. Researchers have proposed a series of coding algorithms to ensure the safe and efficient transmission of video information. We propose an encryption scheme that can protect video inform...

  • Article
  • Open Access
3,698 Views
27 Pages

NVM-Shelf: Secure Hybrid Encryption with Less Flip for Non-Volatile Memory

  • Thomas Haywood Dadzie,
  • Jiwon Lee,
  • Jihye Kim and
  • Hyunok Oh

The Non-Volatile Memory (NVM), such as PRAM or STT-MRAM, is often adopted as the main memory in portable embedded systems. The non-volatility triggers a security issue against physical attacks, which is a vulnerability caused by memory extraction and...

  • Article
  • Open Access
6 Citations
3,589 Views
28 Pages

12 March 2021

With the advancement of 5G mobile telecommunication, various IoT (Internet of Things) devices communicate massive amounts of data by being connected to wireless networks. Since this wireless communication is vulnerable to hackers via data leakage dur...

  • Article
  • Open Access
12 Citations
5,944 Views
19 Pages

1 September 2022

Personal data security is a cybersecurity trend that has captured the world’s attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is...

  • Article
  • Open Access
2 Citations
2,490 Views
15 Pages

1 April 2025

This study addresses the growing demand for scalable data encryption by evaluating the performance of AES (Advanced Encryption Standard) encryption and decryption using CBC (Cipher Block Chaining) and CTR (Counter Mode) modes across various CPU (Cent...

  • Article
  • Open Access
1,284 Views
21 Pages

9 October 2025

In this paper, the authors analyze the applicability of artificial intelligence algorithms for classifying file encryption methods based on statistical features extracted from the binary content of files. The prepared datasets included both unencrypt...

  • Article
  • Open Access
1 Citations
2,818 Views
18 Pages

With the rapid development and wide application of cloud computing and 5G communication, the number of mobile users is increasing rapidly, meaning that cloud storage services are receiving more and more attention. The equality test technology of retr...

  • Article
  • Open Access
3 Citations
9,566 Views
16 Pages

Key Management Systems at the Cloud Scale

  • Matthew Campagna and
  • Shay Gueron

This paper describes a cloud-scale encryption system. It discusses the constraints that shaped the design of Amazon Web Services’ Key Management Service, and in particular, the challenges that arise from using a standard mode of operation such...

  • Article
  • Open Access
7 Citations
2,123 Views
21 Pages

A Novel Separable Scheme for Encryption and Reversible Data Hiding

  • Pei Chen,
  • Yang Lei,
  • Ke Niu and
  • Xiaoyuan Yang

28 October 2022

With the increasing emphasis on security and privacy, video in the cloud sometimes needs to be stored and processed in an encrypted format. To facilitate the indexing and tampering detection of encrypted videos, data hiding is performed in encrypted...

  • Article
  • Open Access
2,409 Views
29 Pages

Virtual reality (VR)/the metaverse is transforming into a ubiquitous technology by leveraging smart devices to provide highly immersive experiences at an affordable price. Cryptographically securing such augmented reality schemes is of paramount impo...

  • Article
  • Open Access
22 Citations
4,110 Views
29 Pages

23 August 2021

For efficiency and security of image transmission and storage, the joint image compression and encryption method that performs compression and encryption in a single step is a promising solution due to better security. Moreover, on some important occ...

  • Article
  • Open Access
27 Citations
5,168 Views
30 Pages

20 November 2018

Large numbers of images are produced in many fields every day. The content security of digital images becomes an important issue for scientists and engineers. Inspired by the magic cube game, a three-dimensional (3D) permutation model is established...

  • Article
  • Open Access
12 Citations
2,590 Views
26 Pages

A Probabilistic Chaotic Image Encryption Scheme

  • Ali Kanso,
  • Mohammad Ghebleh and
  • Mazen Bou Khuzam

2 June 2022

This paper proposes a probabilistic image encryption scheme that improves on existing deterministic schemes by using a chaining mode of chaotic maps in a permutation-masking process. Despite its simplicity, the permutation phase destroys any correlat...

  • Communication
  • Open Access
9 Citations
3,475 Views
11 Pages

26 August 2022

Optical orbital angular momentum (OAM) holography has been developed and implemented as a vital method for optical encryption. However, OAM holography can only be encoded and decoded with an OAM beam, which limits the level of optical encryption. Her...

  • Article
  • Open Access
7 Citations
15,699 Views
32 Pages

The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock

  • Weiping Zhang,
  • Wenyuan Chen,
  • Jian Tang,
  • Peng Xu,
  • Yibin Li and
  • Shengyong Li

19 November 2009

In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption sys...

  • Article
  • Open Access
11 Citations
2,720 Views
9 Pages

Throughput Optimized Reversible Cellular Automata Based Security Algorithm

  • Surendra Kumar Nanda,
  • Suneeta Mohanty,
  • Prasant Kumar Pattnaik and
  • Mangal Sain

5 October 2022

Reversible cellular automation is a highly parallel system and produces enhanced throughput in its cryptographic applications. The throughput optimized security algorithm based on reversible cellular automata produces a better result in high-performa...

  • Article
  • Open Access
1 Citations
1,218 Views
26 Pages

28 March 2024

COPA, introduced by Andreeva et al., is the first online authenticated encryption (AE) mode with nonce-misuse resistance, and it is covered in COLM, which is one of the final CAESAR portfolios. However, COPA has been proven to be insecure in the rele...

  • Article
  • Open Access
248 Views
15 Pages

The efficiency optimization of encryption and decryption algorithms in cloud environments is addressed in this study, where the processing speed of encryption and decryption is enhanced through the application of multi-threaded parallel technology. I...

  • Article
  • Open Access
18 Citations
2,879 Views
25 Pages

8 August 2023

As an effective method for image security protection, image encryption is widely used in data hiding and content protection. This paper proposes an image encryption algorithm based on an improved Hilbert curve with DNA coding. Firstly, the discrete w...

  • Article
  • Open Access
11 Citations
3,068 Views
14 Pages

17 November 2022

Recently, with the rapid development of data and information, it has become necessary to establish secure communications and appropriate security services to ensure a secure information exchange process. Therefore, to protect the privacy and confiden...

  • Article
  • Open Access
6 Citations
3,392 Views
24 Pages

This paper investigates the robust adaptive synchronization of multi-mode fractional-order chaotic systems (MMFOCS). To that end, synchronization was performed with unknown parameters, unknown time delays, the presence of disturbance, and uncertainty...

  • Article
  • Open Access
28 Citations
4,313 Views
28 Pages

30 January 2022

Digital chaotic maps have been widely used in the fields of cryptography owing to their dynamic characteristics, however, some unfavorable security properties arise when they operate on devices with limited precision. Thus, enhancing the properties o...

  • Feature Paper
  • Article
  • Open Access
137 Views
22 Pages

Indistinguishability is a fundamental principle of cryptographic security, crucial for securing data transmitted between Internet of Things (IoT) devices. This principle ensures that an attacker cannot distinguish between the encrypted data, also kno...

  • Communication
  • Open Access
4 Citations
2,762 Views
11 Pages

Analog–Digital Combined High-Secure Optical Communication System Based on Chaotic Circuit Driving

  • Qing Zhong,
  • Bo Liu,
  • Jianxin Ren,
  • Yicheng Jiang,
  • Rahat Ullah,
  • Zhiruo Guo,
  • Yaya Mao,
  • Xiangyu Wu,
  • Yongfeng Wu and
  • Tingting Sun
  • + 1 author

19 September 2022

We propose and demonstrate a new analog–digital combined high-secure optical communication system based on chaotic circuit driving, which achieves encryption in the analog and digital domains. A 3D chaotic system is used for analog domain phase...

  • Article
  • Open Access
4 Citations
1,775 Views
19 Pages

Research on Dynamic Searchable Encryption Method Based on Bloom Filter

  • Ziqi Jin,
  • Dongmei Li,
  • Xiaomei Zhang and
  • Zhi Cai

17 April 2024

Data outsourcing has become more and more popular due to its low cost and flexibility. However, there is a problem that the cloud server used to store data is partially trusted. Searchable encryption is an efficient technology that is devoted to help...

  • Article
  • Open Access
1 Citations
258 Views
21 Pages

28 December 2025

Encryption-then-compression (EtC) enables secure image processing while retaining coding efficiency. In grayscale-based EtC pipelines with YCbCr transformation and component serialization, reversible data hiding (RDH) becomes challenging because cros...

  • Proceeding Paper
  • Open Access
3 Citations
3,463 Views
11 Pages

E1-E6 SDR Platform Based on BladeRF for Testing Galileo-Assisted Commercial Authentication Service

  • Rafael Terris-Gallego,
  • Ignacio Fernandez-Hernandez,
  • José A. López-Salcedo and
  • Gonzalo Seco-Granados

29 October 2023

To enhance the robustness of the Global Navigation Satellite System (GNSS) against malicious attacks (e.g., spoofing), the European Galileo is working on new services, like Open Service Navigation Message Authentication (OSNMA), which provides authen...

  • Article
  • Open Access
5 Citations
1,786 Views
17 Pages

New Step in Lightweight Medical Image Encryption and Authenticity

  • Saleem Alsaraireh,
  • Ashraf Ahmad and
  • Yousef AbuHour

28 May 2025

Data security is critical, particularly in medical imaging, yet remains challenging. Many research efforts have focused on enhancing medical image security, particularly during network transmission. Ensuring confidentiality and authenticity is a key...

  • Article
  • Open Access
1 Citations
425 Views
15 Pages

Quantum Security of Nonce-Based Encryption

  • Shuping Mao,
  • Peng Wang,
  • Yan Jia,
  • Gang Liu and
  • Bing Liu

24 November 2025

We investigate the quantum security of nonce-based encryption under the indistinguishability against quantum chosen-plaintext attacks (IND-qCPA). While classical results establish that IV-based modes such as CBC, CFB, OFB, and CTR achieve IND-qCPA se...

  • Article
  • Open Access
1 Citations
7,972 Views
25 Pages

In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We present CMCC (CBC-MAC-CTR-CBC), an authenticated encryption scheme with associated data (AEAD) that is also nonce misuse r...

of 3