Skip Content
You are currently on the new version of our website. Access the old version .

33 Results Found

  • Article
  • Open Access

5 February 2026

Grayscale-based Encryption-then-Compression (EtC) systems transform RGB images into the YCbCr color space, concatenate the components into a single grayscale image, and apply block permutation, block rotation/flipping, and block-wise negative–p...

  • Article
  • Open Access
235 Views
21 Pages

28 December 2025

Encryption-then-compression (EtC) enables secure image processing while retaining coding efficiency. In grayscale-based EtC pipelines with YCbCr transformation and component serialization, reversible data hiding (RDH) becomes challenging because cros...

  • Article
  • Open Access
2 Citations
1,166 Views
19 Pages

Symmetric Grayscale Image Encryption Based on Quantum Operators with Dynamic Matrices

  • Luis Olvera-Martinez,
  • Manuel Cedillo-Hernandez,
  • Carlos Adolfo Diaz-Rodriguez,
  • Leonardo Faustinos-Morales,
  • Antonio Cedillo-Hernandez and
  • Francisco Javier Garcia-Ugalde

17 March 2025

Image encryption is crucial for ensuring the confidentiality and integrity of digital images, preventing unauthorized access and alterations. However, existing encryption algorithms often involve complex mathematical operations or require specialized...

  • Article
  • Open Access
45 Citations
4,156 Views
19 Pages

A Novel Grayscale Image Encryption Scheme Based on the Block-Level Swapping of Pixels and the Chaotic System

  • Muhammad Hanif,
  • Nadeem Iqbal,
  • Fida Ur Rahman,
  • Muhammad Adnan Khan,
  • Taher M. Ghazal,
  • Sagheer Abbas,
  • Munir Ahmad,
  • Hussam Al Hamadi and
  • Chan Yeob Yeun

19 August 2022

Hundreds of image encryption schemes have been conducted (as the literature review indicates). The majority of these schemes use pixels as building blocks for confusion and diffusion operations. Pixel-level operations are time-consuming and, thus, no...

  • Article
  • Open Access
156 Views
29 Pages

26 January 2026

Encryption-then-compression (EtC) based on block scrambling enables privacy-preserving image sharing while maintaining compatibility with standard image codecs, yet it disrupts the spatial correlations and synchronization cues required by conventiona...

  • Article
  • Open Access
14 Citations
2,707 Views
14 Pages

Nonlinear Encryption for Multiple Images Based on a Joint Transform Correlator and the Gyrator Transform

  • Ronal A. Perez,
  • Juan M. Vilardy,
  • Elisabet Pérez-Cabré,
  • María S. Millán and
  • Cesar O. Torres

3 February 2023

A novel nonlinear encryption–decryption system based on a joint transform correlator (JTC) and the Gyrator transform (GT) for the simultaneous encryption and decryption of multiple images in grayscale is proposed. This security system features...

  • Article
  • Open Access
10 Citations
5,470 Views
16 Pages

8 October 2022

XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares. No information about the secret can be obtained from a...

  • Article
  • Open Access
6 Citations
3,161 Views
31 Pages

FPGA Implementation of Parameter-Switching Scheme to Stabilize Chaos in Fractional Spherical Systems and Usage in Secure Image Transmission

  • Vincent-Ademola Adeyemi,
  • Esteban Tlelo-Cuautle,
  • Yuma Sandoval-Ibarra and
  • Jose-Cruz Nuñez-Perez

The main objective of this work was to implement the parameter-switching chaos control scheme for fractional-order spherical systems and develop a chaos-based image encryption and transmission system. The novelty in the developed secure communication...

  • Article
  • Open Access
17 Citations
3,949 Views
19 Pages

Event Encryption for Neuromorphic Vision Sensors: Framework, Algorithm, and Evaluation

  • Bowen Du,
  • Weiqi Li,
  • Zeju Wang,
  • Manxin Xu,
  • Tianchen Gao,
  • Jiajie Li and
  • Hongkai Wen

24 June 2021

Nowadays, our lives have benefited from various vision-based applications, such as video surveillance, human identification and aided driving. Unauthorized access to the vision-related data greatly threatens users’ privacy, and many encryption scheme...

  • Proceeding Paper
  • Open Access
1 Citations
1,420 Views
8 Pages

11 January 2024

In this paper, we proposed an enhanced asymmetric cryptosystem scheme for image encryption using a combination of Elliptic Curve and Fourier transformations. Our proposed encryption and decryption process is highly secure with a smaller key size comp...

  • Article
  • Open Access
3 Citations
1,830 Views
27 Pages

25 July 2023

As the basis for guiding business process decisions, flowcharts contain sensitive information pertaining to process-related concepts. Therefore, it is necessary to encrypt them to protect the privacy or security of stakeholders. Using the principles...

  • Article
  • Open Access
5 Citations
1,127 Views
20 Pages

A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding

  • Linqing Huang,
  • Qingye Huang,
  • Han Chen,
  • Shuting Cai,
  • Xiaoming Xiong and
  • Jian Yang

10 May 2025

Continuous advancements in digital image transmission technology within network environments have heightened the necessity for secure, convenient, and well-suited image encryption systems. Base64 encoding possesses the ability to convert raw data int...

  • Article
  • Open Access
1 Citations
2,779 Views
15 Pages

ET-Mamba: A Mamba Model for Encrypted Traffic Classification

  • Jian Xu,
  • Liangbing Chen,
  • Wenqian Xu,
  • Longxuan Dai,
  • Chenxi Wang and
  • Lei Hu

16 April 2025

With the widespread use of encryption protocols on network data, fast and effective encryption traffic classification can improve the efficiency of traffic analysis. A resampling method combining Wasserstein GAN and random selection is proposed for s...

  • Article
  • Open Access
958 Views
32 Pages

6 August 2025

Conventional image encryption schemes struggle to meet the high security demands of medical images due to their large data volume, strong pixel correlation, and structural redundancy. To address these challenges, we propose a grayscale medical image...

  • Article
  • Open Access
8 Citations
2,830 Views
23 Pages

21 October 2022

Perceptual encryption (PE) of images protects visual information while retaining the intrinsic properties necessary to enable computation in the encryption domain. Block–based PE produces JPEG-compliant images with almost the same compression s...

  • Article
  • Open Access
4 Citations
1,924 Views
20 Pages

Multilayer Convolutional Processing Network Based Cryptography Mechanism for Digital Images Infosecurity

  • Chia-Hung Lin,
  • Chia-Hung Wen,
  • Hsiang-Yueh Lai,
  • Ping-Tzan Huang,
  • Pi-Yun Chen,
  • Chien-Ming Li and
  • Neng-Sheng Pai

12 May 2023

Digital images can be easily shared or stored using different imaging devices, storage tools, and computer networks or wireless communication systems. However, these digital images, such as headshots or medical images, may contain private information...

  • Article
  • Open Access
12 Citations
4,192 Views
41 Pages

A Robust and Secure Watermarking Approach Based on Hermite Transform and SVD-DCT

  • Sandra L. Gomez-Coronel,
  • Ernesto Moya-Albor,
  • Jorge Brieva and
  • Andrés Romero-Arellano

21 July 2023

Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image’s quality is of utmost impor...

  • Article
  • Open Access
7 Citations
2,461 Views
26 Pages

15 February 2023

As the rapid development of third-party storage and homomorphic encryption have profoundly stimulated the desire for secure communication, reversible data hiding in encrypted images has received widespread attention, since it allows lossless data con...

  • Article
  • Open Access
6 Citations
1,837 Views
25 Pages

13 March 2025

A hyperchaotic system was analyzed in this study, and its hyperchaotic behavior was confirmed through dynamic analysis. The system was utilized to develop a pseudo-random number generator (PRNG), whose statistical reliability was validated through NI...

  • Article
  • Open Access
21 Citations
3,195 Views
23 Pages

11 August 2022

Block-based perceptual encryption (PE) algorithms are becoming popular for multimedia data protection because of their low computational demands and format-compliancy with the JPEG standard. In conventional methods, a colored image as an input is a p...

  • Article
  • Open Access
636 Views
37 Pages

A Hyperspectral Remote Sensing Image Encryption Algorithm Based on a Novel Two-Dimensional Hyperchaotic Map

  • Zongyue Bai,
  • Qingzhan Zhao,
  • Wenzhong Tian,
  • Xuewen Wang,
  • Jingyang Li and
  • Yuzhen Wu

30 October 2025

With the rapid advancement of hyperspectral remote sensing technology, the security of hyperspectral images (HSIs) has become a critical concern. However, traditional image encryption methods—designed primarily for grayscale or RGB images&mdash...

  • Article
  • Open Access
1 Citations
1,035 Views
20 Pages

23 May 2025

In the age of big data, multimedia communication is becoming one of the most important communication methods. Therefore, it is important to overcome the challenge of processing numerous images safely and efficiently. In this paper, a 3D cross-image e...

  • Article
  • Open Access
23 Citations
3,179 Views
27 Pages

16 December 2021

Fractional-order chaotic systems have more complex dynamics than integer-order chaotic systems. Thus, investigating fractional chaotic systems for the creation of image cryptosystems has been popular recently. In this article, a fractional-order memr...

  • Article
  • Open Access
3 Citations
1,632 Views
47 Pages

Novel, Fast, Strong, and Parallel: A Colored Image Cipher Based on SBTM CPRNG

  • Ahmad Al-Daraiseh,
  • Yousef Sanjalawe,
  • Salam Fraihat and
  • Salam Al-E’mari

10 May 2024

Smartphones, digital cameras, and other imaging devices generate vast amounts of high-resolution colored images daily, stored on devices equipped with multi-core central processing units or on the cloud. Safeguarding these images from potential attac...

  • Article
  • Open Access
10 Citations
2,967 Views
25 Pages

A Finite State Machine-Based Improved Cryptographic Technique

  • Mohammad Mazyad Hazzazi,
  • Raja Rao Budaraju,
  • Zaid Bassfar,
  • Ashwag Albakri and
  • Sanjay Mishra

9 May 2023

With the advent of several new means of communication, safeguarding the confidentiality of messages has become more crucial. Financial institutions, virtual currencies, and government organizations are all examples of high-risk contexts where informa...

  • Article
  • Open Access
4 Citations
2,251 Views
14 Pages

Complex Rayleigh–van-der-Pol–Duffing Oscillators: Dynamics, Phase, Antiphase Synchronization, and Image Encryption

  • Asma Al Themairi,
  • Gamal M. Mahmoud,
  • Ahmed A. Farghaly and
  • Tarek M. Abed-Elhameed

This paper introduces the complex Rayleigh–van-der- Pol–Duffing oscillators (RVDOs), which are hyperchaotic and can be autonomous or nonautonomous. The fundamental dynamics of the autonomous and nonautonomous complex RVDOs, including diss...

  • Article
  • Open Access
1 Citations
981 Views
42 Pages

Secure and Efficient Data Encryption for Internet of Robotic Things via Chaos-Based Ascon

  • Gülyeter Öztürk,
  • Murat Erhan Çimen,
  • Ünal Çavuşoğlu,
  • Osman Eldoğan and
  • Durmuş Karayel

1 October 2025

The increasing adoption of digital technologies, robotic systems, and IoT applications in sectors such as medicine, agriculture, and industry drives a surge in data generation and necessitates secure and efficient encryption. For resource-constrained...

  • Article
  • Open Access
3 Citations
2,076 Views
18 Pages

Dual Reversible Data Hiding in Encrypted Halftone Images Using Matrix Encoding

  • Cheonshik Kim,
  • Nhu-Ngoc Dao,
  • Ki-Hyun Jung and
  • Lu Leng

Data hiding and reversible data hiding research has primarily focused on grayscale and color images, because binary and halftone images are prone to visual distortion caused by a small number of errors in pixel representation. As a result, reversible...

  • Article
  • Open Access
4 Citations
542 Views
29 Pages

5 October 2025

Fractional-order chaotic systems have emerged as powerful tools in secure communications and multimedia protection owing to their memory-dependent dynamics, large key spaces, and high sensitivity to initial conditions. However, most existing fraction...

  • Article
  • Open Access
9 Citations
3,128 Views
18 Pages

Practical Secret Image Sharing Based on the Chinese Remainder Theorem

  • Longlong Li,
  • Yuliang Lu,
  • Lintao Liu,
  • Yuyuan Sun and
  • Jiayu Wang

7 June 2022

Compared with Shamir’s original secret image sharing (SIS), the Chinese-remainder-theorem-based SIS (CRTSIS) generally has the advantages of a lower computation complexity, lossless recovery and no auxiliary encryption. However, general CRTSIS...

  • Article
  • Open Access
53 Citations
5,394 Views
20 Pages

Android Malware Detection Using TCN with Bytecode Image

  • Wenhui Zhang,
  • Nurbol Luktarhan,
  • Chao Ding and
  • Bei Lu

22 June 2021

With the rapid increase in the number of Android malware, the image-based analysis method has become an effective way to defend against symmetric encryption and confusing malware. At present, the existing Android malware bytecode image detection meth...

  • Article
  • Open Access
1 Citations
1,571 Views
35 Pages

25 October 2024

With the rapid advancement of information technology, digital images such as medical images, grayscale images, and color images are widely used, stored, and transmitted. Therefore, protecting this type of information is a critical challenge. Meanwhil...

  • Article
  • Open Access
306 Views
24 Pages

Cross-site scripting (XSS) attacks are among the threats facing web security, resulting from the diversity and complexity of HTML formats. Research has shown that some text processing-based methods are limited in their ability to detect this type of...