Skip to Content

613 Results Found

  • Feature Paper
  • Article
  • Open Access
8 Citations
5,323 Views
16 Pages

25 October 2019

The new developments in smart cyber-physical systems can be shown to include smart cities, Internet of things (IoT), and for the most part smart anything. To improve the security of sensitive personal information (SPI) in cyber-physical systems, we p...

  • Article
  • Open Access
21 Citations
5,859 Views
17 Pages

3 January 2019

Information security is the foundation for building trust between the Internet of Things (IoT) and its users. Due to the sharp increase of information quantity and the limitation of hardware resources, it is difficult to maintain the high performance...

  • Article
  • Open Access
677 Views
20 Pages

Edge-Enabled Hybrid Encryption Framework for Secure Health Information Exchange in IoT-Based Smart Healthcare Systems

  • Norjihan Abdul Ghani,
  • Bintang Annisa Bagustari,
  • Muneer Ahmad,
  • Herman Tolle and
  • Diva Kurnianingtyas

14 December 2025

The integration of the Internet of Things (IoT) and edge computing is transforming healthcare by enabling real-time acquisition, processing, and exchange of sensitive patient data close to the data source. However, the distributed nature of IoT-enabl...

  • Article
  • Open Access
9 Citations
3,788 Views
19 Pages

14 February 2023

iBeacon systems have been increasingly established in public areas to assist users in terms of indoor location navigation and positioning. People receive the services through the Bluetooth Low Energy (BLE) installed on their mobile phones. However, t...

  • Article
  • Open Access
27 Citations
8,898 Views
33 Pages

Information Security Methods—Modern Research Directions

  • Alexander Shelupanov,
  • Oleg Evsyutin,
  • Anton Konev,
  • Evgeniy Kostyuchenko,
  • Dmitry Kruchinin and
  • Dmitry Nikiforov

29 January 2019

In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the deve...

  • Article
  • Open Access
11 Citations
4,126 Views
18 Pages

7 February 2020

With the advent of the information age, the effective identification of sensitive information and the leakage of sensitive information during the transmission process are becoming increasingly serious issues. We designed a sensitive information recog...

  • Article
  • Open Access
4 Citations
2,032 Views
23 Pages

26 June 2023

In this paper, a framework for authorization and personal image protection that applies user accounts, passwords, and personal I-vectors as the keys for ciphering the image content was developed and connected. There were two main systems in this fram...

  • Article
  • Open Access
4 Citations
2,983 Views
12 Pages

29 June 2022

Ensuring the reliability of data gathering from every connected device is an essential issue for promoting the advancement of the next paradigm shift, i.e., Industry 4.0. Blockchain technology is becoming recognized as an advanced tool. However, data...

  • Article
  • Open Access
4,022 Views
19 Pages

Privacy-Aware MapReduce Based Multi-Party Secure Skyline Computation

  • Saleh Ahmed,
  • Mahboob Qaosar,
  • Asif Zaman,
  • Md. Anisuzzaman Siddique,
  • Chen Li,
  • Kazi Md. Rokibul Alam and
  • Yasuhiko Morimoto

Selecting representative objects from a large-scale dataset is an important task for understanding the dataset. Skyline is a popular technique for selecting representative objects from a large dataset. It is obvious that the skyline computation from...

  • Article
  • Open Access
6 Citations
2,991 Views
23 Pages

A Chunked and Disordered Data Privacy Protection Algorithm: Application to Resource Platform Systems

  • Daike Zhang,
  • Junyang Chen,
  • Yihui He,
  • Xiaoqing Lan,
  • Xian Chen,
  • Chunlin Dong and
  • Jun Li

13 May 2023

This paper provides a systematic analysis of existing resource platforms, evaluating their advantages and drawbacks with respect to data privacy protection. To address the privacy and security risks associated with resource platform data, we propose...

  • Article
  • Open Access
32 Citations
12,675 Views
20 Pages

6 October 2021

Cross-border e-commerce, involving international product transactions via online and mobile platforms, is growing at a dramatic rate around the globe. One of the main concerns of brand firms is preventing counterfeit products from being sold under th...

  • Article
  • Open Access
96 Citations
5,697 Views
23 Pages

A Multidimensional Hyperjerk Oscillator: Dynamics Analysis, Analogue and Embedded Systems Implementation, and Its Application as a Cryptosystem

  • Tsafack Nestor,
  • Nkapkop Jean De Dieu,
  • Kengne Jacques,
  • Effa Joseph Yves,
  • Abdullah M. Iliyasu and
  • Ahmed A. Abd El-Latif

21 December 2019

A lightweight image encryption algorithm is presented based on chaos induction via a 5-dimensional hyperjerk oscillator (5DHO) network. First, the dynamics of our 5DHO network is investigated and shown to exhibit up to five coexisting hidden attracto...

  • Article
  • Open Access
123 Citations
6,855 Views
20 Pages

13 August 2019

In order to improve the security and efficiency of image encryption systems comprehensively, a novel chaotic S-box based image encryption scheme is proposed. Firstly, a new compound chaotic system, Sine-Tent map, is proposed to widen the chaotic rang...

  • Article
  • Open Access
5 Citations
2,980 Views
29 Pages

KryptosChain—A Blockchain-Inspired, AI-Combined, DNA-Encrypted Secure Information Exchange Scheme

  • Pratyusa Mukherjee,
  • Chittaranjan Pradhan,
  • Hrudaya Kumar Tripathy and
  • Tarek Gaber

Today’s digital world necessitates the adoption of encryption techniques to ensure secure peer-to-peer communication. The sole purpose of this paper is to conglomerate the fundamentals of Blockchain, AI (Artificial Intelligence) and DNA (Deoxyribonuc...

  • Article
  • Open Access
1 Citations
617 Views
12 Pages

Hydrogen-Bond Engineering for Highly Efficient Room-Temperature Phosphorescence with Tunable Multi-Color Emission

  • Lin Ding,
  • Zhaorun Tang,
  • Jiyang Long,
  • Xianwen Ke,
  • Ruqian Peng,
  • Ruyi Wei and
  • Xinghai Liu

Achieving long-lived room-temperature phosphorescence (RTP) with high quantum efficiency is of significant interest for applications in anti-counterfeiting, flexible optoelectronic displays, and multi-level information encryption. Here, we presented...

  • Communication
  • Open Access
1 Citations
2,022 Views
11 Pages

Digital holographic encryption is an important information security technology. Traditional encryption techniques require the use of keys to encrypt information. If the key is lost, it is difficult to recover information, so new technologies that all...

  • Article
  • Open Access
16 Citations
4,118 Views
23 Pages

Simultaneous Audio Encryption and Compression Using Compressive Sensing Techniques

  • Rodolfo Moreno-Alvarado,
  • Eduardo Rivera-Jaramillo,
  • Mariko Nakano and
  • Hector Perez-Meana

The development of coding schemes with the capacity to simultaneously encrypt and compress audio signals is a subject of active research because of the increasing necessity for transmitting sensitive audio information over insecure communication chan...

  • Article
  • Open Access
3 Citations
2,255 Views
17 Pages

Compared to text and images, video can show information more vividly and intuitively via a moving picture; therefore, video is widely used in all walks of life. However, videos uploaded or stored in various video applications have not been treated wi...

  • Article
  • Open Access
4 Citations
2,921 Views
17 Pages

8 March 2021

A digital elevation model (DEM) digitally records information about terrain variations and has found many applications in different fields of geosciences. To protect such digital information, encryption is one technique. Numerous encryption algorithm...

  • Article
  • Open Access
5 Citations
3,117 Views
13 Pages

A VOHE System for Underwater Communications

  • Yang Peng,
  • Tomoyuki Nagase,
  • Shan You and
  • Toshiki Kanamoto

23 September 2020

This paper presents a new method for encrypting holographic information based on optical and acoustic signals called a Virtual Optical Holographic Encryption (VOHE) system for underwater communications that can be applicable for communications betwee...

  • Article
  • Open Access
8 Citations
1,971 Views
22 Pages

17 January 2025

This paper skillfully incorporates the memristor model into a chaotic system, creating a two-dimensional (2D) hyperchaotic map. The system’s exceptional chaotic performance is verified through methods such as phase diagrams, bifurcation diagram...

  • Article
  • Open Access
37 Citations
4,347 Views
20 Pages

Chaos-Based Secure Communications in Biomedical Information Application

  • Teh-Lu Liao,
  • Hsin-Chieh Chen,
  • Chiau-Yuan Peng and
  • Yi-You Hou

Recently, with the rapid development of biomedical information, establishing secure communication and appropriate security services has become necessary to ensure a secure information exchange process. Therefore, to protect the privacy and confidenti...

  • Article
  • Open Access
565 Views
26 Pages

1 December 2025

Images, as carriers of rich information, are generated, stored, and transmitted in various forms across diverse scenarios. It has become an important issue in the field of information security today to encrypt images to ensure information security. T...

  • Article
  • Open Access
629 Views
21 Pages

13 November 2025

To address the security of digital images, this paper proposes a novel image encryption algorithm based on a six-dimensional memristive chaotic system. First, the algorithm uses the Secure Hash Algorithm 256 (SHA-256) to generate a hash value, from w...

  • Article
  • Open Access
5 Citations
2,947 Views
12 Pages

Double Image Encryption System Using a Nonlinear Joint Transform Correlator in the Fourier Domain

  • Ronal A. Perez,
  • Elisabet Pérez-Cabré,
  • Juan M. Vilardy,
  • María S. Millán and
  • Cesar O. Torres

2 February 2023

In this work, we present a new nonlinear joint transform correlator (JTC) architecture in the Fourier domain (FD) for the encryption and decryption of two simultaneous images. The main features of the proposed system are its increased level of securi...

  • Article
  • Open Access
10 Citations
4,408 Views
16 Pages

12 October 2018

With the deepening of modern military reforms, information has become the key to winning modern warfare. The use of unmanned aerial vehicle (UAV) to capture image information has become an important means of reconnaissance in modern warfare and plays...

  • Article
  • Open Access
7 Citations
3,101 Views
24 Pages

Scaling Analysis of an Image Encryption Scheme Based on Chaotic Dynamical Systems

  • L. E. Reyes-López,
  • J. S. Murguía,
  • H. González-Aguilar,
  • M. T. Ramírez-Torres,
  • M. Mejía-Carlos and
  • J. O. Armijo-Correa

27 May 2021

Despite that many image encryption systems based on chaotic or hyperchaotic systems have been proposed to protect different kinds of information, it has been crucial to achieve as much security as possible in such systems. In this sense, we numerical...

  • Article
  • Open Access
2 Citations
1,668 Views
10 Pages

30 September 2024

Coherent diffractive imaging is an optical methodology that encodes information about an object within the diffraction intensity. Here, we introduce a diffractive optical encryption system that utilizes multiple wavelengths and multiple distances, si...

  • Article
  • Open Access
22 Citations
8,443 Views
26 Pages

Facial Image Encryption for Secure Face Recognition System

  • Eimad Abusham,
  • Basil Ibrahim,
  • Kashif Zia and
  • Muhammad Rehman

A biometric authentication system is more convenient and secure than graphical or textual passwords when accessing information systems. Unfortunately, biometric authentication systems have the disadvantage of being susceptible to spoofing attacks. Au...

  • Article
  • Open Access
5 Citations
4,746 Views
27 Pages

Efficacy Improvement of Anomaly Detection by Using Intelligence Sharing Scheme

  • Muhammad Tahir,
  • Mingchu Li,
  • Naeem Ayoub and
  • Muhammad Aamir

22 January 2019

Computer networks are facing threats of ever-increasing frequency and sophistication. Encryption is becoming the norm in both legitimate and malicious network traffic. Therefore, intrusion detection systems (IDSs) are now required to work efficiently...

  • Article
  • Open Access
5 Citations
1,592 Views
24 Pages

14 April 2024

The secure transmission of information is one of the most important topics in the field of information technology. Considering that images contain important visual information, it is crucial to create a safe platform for image transfer. One commonly...

  • Article
  • Open Access
23 Citations
2,438 Views
22 Pages

With the advancement of information technology, the security of digital images has become increasingly important. To ensure the integrity of images, a novel color image-encryption algorithm based on extended DNA coding, Zig-Zag transform, and a fract...

  • Article
  • Open Access
20 Citations
3,040 Views
15 Pages

Enhancing Cloud Communication Security: A Blockchain-Powered Framework with Attribute-Aware Encryption

  • Raghunandan K. R.,
  • Bhavya Kallapu,
  • Radhakrishna Dodmane,
  • Krishnaraj Rao N. S.,
  • Srinivasarao Thota and
  • Aditya Kumar Sahu

14 September 2023

The global production of information continuously increases in quantity and variety. However, the tools and technologies developed to handle such large volumes of data have not adequately met the security and privacy requirements. Existing cloud secu...

  • Article
  • Open Access
6 Citations
2,204 Views
33 Pages

A DNA Encoding Image Encryption Algorithm Based on Chaos

  • Li Huang,
  • Cong Ding,
  • Zhenjie Bao,
  • Haitao Chen and
  • Changsheng Wan

18 April 2025

With the development of society and the Internet, images have become an important medium for information exchange. To improve the security of image encryption and transmission, a new image encryption algorithm based on bit-plane decomposition, DNA en...

  • Article
  • Open Access
8 Citations
1,769 Views
29 Pages

5 November 2024

The transition from text to images as the primary form of information transmission has recently increased the need for secure and effective encryption techniques due to the expanding information dimensions. The color picture encryption algorithm util...

  • Article
  • Open Access
11 Citations
4,259 Views
10 Pages

18 January 2019

An encryption algorithm for hyperspectral data in fractional Fourier domain is designed. Firstly, the original hyperspectral image is separated into single bands and then each pair of bands are regarded as the real and imaginary part of a complex fun...

  • Article
  • Open Access
2 Citations
1,416 Views
18 Pages

Multi-Objective Region Encryption Algorithm Based on Adaptive Mechanism

  • Juan Wang,
  • Boyong Gao,
  • Xingchuang Xiong,
  • Zilong Liu and
  • Chenbo Pei

The advancement of information technology has led to the widespread application of remote measurement systems, where information in the form of images or videos, serving as measurement results, is transmitted over networks. However, this transmission...

  • Article
  • Open Access
2 Citations
2,881 Views
26 Pages

23 January 2022

Encryption is the de facto method for protecting information, whether this information is locally stored or on transit. Although we have many encryption techniques, they have problems inherited from the computational models that they use. For instanc...

  • Article
  • Open Access
301 Views
25 Pages

23 January 2026

With the rapid development of Internet of Things (IoT) and Artificial Intelligence (AI) technologies, information security has become a critical issue. To develop a highly secure image encryption transmission system, this study proposes a novel key g...

  • Article
  • Open Access
20 Citations
3,174 Views
21 Pages

A Novel Color Image Encryption Scheme Based on Hyperchaos and Hopfield Chaotic Neural Network

  • Yanan Wu,
  • Jian Zeng,
  • Wenjie Dong,
  • Xinyu Li,
  • Danyang Qin and
  • Qun Ding

17 October 2022

Problems such as insufficient key space, lack of a one-time pad, and a simple encryption structure may emerge in existing encryption schemes. To solve these problems, and keep sensitive information safe, this paper proposes a plaintext-related color...

  • Article
  • Open Access
55 Citations
5,275 Views
20 Pages

In this paper, a novel image encryption scheme based on a fractional-order Henon chaotic map, a two-dimensional (2D) Discrete Wavelet Transform (DWT) and a four-dimensional (4D) hyperchaotic system is proposed. Firstly, the original image is transfor...

  • Article
  • Open Access
3 Citations
1,874 Views
27 Pages

25 July 2023

As the basis for guiding business process decisions, flowcharts contain sensitive information pertaining to process-related concepts. Therefore, it is necessary to encrypt them to protect the privacy or security of stakeholders. Using the principles...

  • Article
  • Open Access
3 Citations
1,259 Views
24 Pages

27 November 2024

To address the vulnerability of existing hiding algorithms to differential attacks and the limitations of single chaotic systems, such as small key space and low security, a novel algorithm combining audio encryption with information hiding is propos...

  • Article
  • Open Access
9 Citations
3,730 Views
33 Pages

16 July 2021

In a secret communication system using chaotic synchronization, the communication information is embedded in a signal that behaves as chaos and is sent to the receiver to retrieve the information. In a previous study, a chaotic synchronous system was...

  • Article
  • Open Access
11 Citations
3,105 Views
14 Pages

17 November 2022

Recently, with the rapid development of data and information, it has become necessary to establish secure communications and appropriate security services to ensure a secure information exchange process. Therefore, to protect the privacy and confiden...

  • Article
  • Open Access
120 Citations
7,582 Views
22 Pages

2 January 2023

In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathematical model of the new chaotic system combines a sine map and a fract...

  • Article
  • Open Access
9 Citations
2,602 Views
29 Pages

15 September 2022

With the improved hardware storage capabilities and the rapid development of artificial intelligence image recognition technology, information is becoming image-oriented. Increasingly sensitive image data needs to be processed. When facing a large am...

  • Article
  • Open Access
14 Citations
2,806 Views
14 Pages

Nonlinear Encryption for Multiple Images Based on a Joint Transform Correlator and the Gyrator Transform

  • Ronal A. Perez,
  • Juan M. Vilardy,
  • Elisabet Pérez-Cabré,
  • María S. Millán and
  • Cesar O. Torres

3 February 2023

A novel nonlinear encryption–decryption system based on a joint transform correlator (JTC) and the Gyrator transform (GT) for the simultaneous encryption and decryption of multiple images in grayscale is proposed. This security system features...

  • Article
  • Open Access
44 Citations
4,233 Views
20 Pages

26 January 2022

In response to the problems of high complexity and the large amount of operations of existing color image encryption algorithms, a low-complexity, low-operation color image encryption algorithm based on a combination of bit-plane and chaotic systems...

  • Article
  • Open Access
1,062 Views
27 Pages

Texture-Adaptive Hierarchical Encryption Method for Large-Scale HR Remote Sensing Image Data

  • Jianbo Tang,
  • Xingxiang Jiang,
  • Chaoyi Huang,
  • Chen Ding,
  • Min Deng,
  • Zhengyuan Huang,
  • Jia Duan and
  • Xiaoye Zhu

24 August 2025

High-resolution (HR) remote sensing images contain rich, sensitive information regarding the distribution of geospatial objects and natural resources. With the widespread application of HR remote sensing images, there is an urgent need to protect the...

of 13