Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (48)
  • Open Access

    ARTICLE

    AI-Powered Image Security: Utilizing Autoencoders for Advanced Medical Image Encryption

    Fehaid Alqahtani*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1709-1724, 2024, DOI:10.32604/cmes.2024.054976 - 27 September 2024

    Abstract With the rapid advancement in artificial intelligence (AI) and its application in the Internet of Things (IoT), intelligent technologies are being introduced in the medical field, giving rise to smart healthcare systems. The medical imaging data contains sensitive information, which can easily be stolen or tampered with, necessitating secure encryption schemes designed specifically to protect these images. This paper introduces an artificial intelligence-driven novel encryption scheme tailored for the secure transmission and storage of high-resolution medical images. The proposed scheme utilizes an artificial intelligence-based autoencoder to compress high-resolution medical images and to facilitate fast encryption… More >

  • Open Access

    ARTICLE

    Chaotic CS Encryption: An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing

    Mingliang Sun, Jie Yuan*, Xiaoyong Li, Dongxiao Liu

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2625-2646, 2024, DOI:10.32604/cmc.2024.050337 - 15 May 2024

    Abstract Images are the most important carrier of human information. Moreover, how to safely transmit digital images through public channels has become an urgent problem. In this paper, we propose a novel image encryption algorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiency of image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSE can fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks, such as differential attacks, and exhibit robustness. First, we use a sparse… More >

  • Open Access

    ARTICLE

    Color Image Compression and Encryption Algorithm Based on 2D Compressed Sensing and Hyperchaotic System

    Zhiqing Dong1, Zhao Zhang1,*, Hongyan Zhou2, Xuebo Chen2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1977-1993, 2024, DOI:10.32604/cmc.2024.047233 - 27 February 2024

    Abstract With the advent of the information security era, it is necessary to guarantee the privacy, accuracy, and dependable transfer of pictures. This study presents a new approach to the encryption and compression of color images. It is predicated on 2D compressed sensing (CS) and the hyperchaotic system. First, an optimized Arnold scrambling algorithm is applied to the initial color images to ensure strong security. Then, the processed images are concurrently encrypted and compressed using 2D CS. Among them, chaotic sequences replace traditional random measurement matrices to increase the system’s security. Third, the processed images are More >

  • Open Access

    ARTICLE

    Digital Image Encryption Algorithm Based on Double Chaotic Map and LSTM

    Luoyin Feng1,*, Jize Du2, Chong Fu1

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1645-1662, 2023, DOI:10.32604/cmc.2023.042630 - 29 November 2023

    Abstract In the era of network communication, digital image encryption (DIE) technology is critical to ensure the security of image data. However, there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital images. So, this paper addresses this gap by studying the generation of pseudo-random sequences (PRS) chaotic signals using dual logistic chaotic maps. These signals are then predicted using long and short-term memory (LSTM) networks, resulting in the reconstruction of a new chaotic signal. During the research process, it was discovered that there are numerous training… More >

  • Open Access

    ARTICLE

    Computational Intelligence Driven Secure Unmanned Aerial Vehicle Image Classification in Smart City Environment

    Firas Abedi1, Hayder M. A. Ghanimi2, Abeer D. Algarni3, Naglaa F. Soliman3,*, Walid El-Shafai4,5, Ali Hashim Abbas6, Zahraa H. Kareem7, Hussein Muhi Hariz8, Ahmed Alkhayyat9

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3127-3144, 2023, DOI:10.32604/csse.2023.038959 - 09 November 2023

    Abstract Computational intelligence (CI) is a group of nature-simulated computational models and processes for addressing difficult real-life problems. The CI is useful in the UAV domain as it produces efficient, precise, and rapid solutions. Besides, unmanned aerial vehicles (UAV) developed a hot research topic in the smart city environment. Despite the benefits of UAVs, security remains a major challenging issue. In addition, deep learning (DL) enabled image classification is useful for several applications such as land cover classification, smart buildings, etc. This paper proposes novel meta-heuristics with a deep learning-driven secure UAV image classification (MDLS-UAVIC) model… More >

  • Open Access

    ARTICLE

    A New S-Box Design System for Data Encryption Using Artificial Bee Colony Algorithm

    Yazeed Yasin Ghadi1, Mohammed S. Alshehri2, Sultan Almakdi2, Oumaima Saidani3,*, Nazik Alturki3, Fawad Masood4, Muhammad Shahbaz Khan5

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 781-797, 2023, DOI:10.32604/cmc.2023.042777 - 31 October 2023

    Abstract Securing digital image data is a key concern in today’s information-driven society. Effective encryption techniques are required to protect sensitive image data, with the Substitution-box (S-box) often playing a pivotal role in many symmetric encryption systems. This study introduces an innovative approach to creating S-boxes for encryption algorithms. The proposed S-boxes are tested for validity and non-linearity by incorporating them into an image encryption scheme. The nonlinearity measure of the proposed S-boxes is 112. These qualities significantly enhance its resistance to common cryptographic attacks, ensuring high image data security. Furthermore, to assess the robustness of… More >

  • Open Access

    ARTICLE

    A Novel Approach for Image Encryption with Chaos-RNA

    Yan Hong1,2, Shihui Fang2,*, Jingming Su2, Wanqiu Xu2, Yuhao Wei2, Juan Wu2, Zhen Yang1,3,*

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 139-160, 2023, DOI:10.32604/cmc.2023.043424 - 31 October 2023

    Abstract In today’s information society, image encryption technology is crucial to protecting Internet security. However, traditional image encryption algorithms have problems such as insufficient chaotic characteristics, insufficient randomness of keys, and insecure Ribonucleic Acid (RNA) encoding. To address these issues, a chaos-RNA encryption scheme that combines chaotic maps and RNA encoding was proposed in this research. The initial values and parameters of the chaotic system are first generated using the Secure Hash Algorithm 384 (SHA-384) function and the plaintext image. Next, the Lü hyperchaotic system sequence was introduced to change the image’s pixel values to realize… More > Graphic Abstract

    A Novel Approach for Image Encryption with Chaos-RNA

  • Open Access

    ARTICLE

    A Novel Parallel Computing Confidentiality Scheme Based on Hindmarsh-Rose Model

    Jawad Ahmad1,*, Mimonah Al Qathrady2, Mohammed S. Alshehri3, Yazeed Yasin Ghadi4, Mujeeb Ur Rehman5, Syed Aziz Shah6

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1325-1341, 2023, DOI:10.32604/cmc.2023.040858 - 30 August 2023

    Abstract Due to the inherent insecure nature of the Internet, it is crucial to ensure the secure transmission of image data over this network. Additionally, given the limitations of computers, it becomes even more important to employ efficient and fast image encryption techniques. While 1D chaotic maps offer a practical approach to real-time image encryption, their limited flexibility and increased vulnerability restrict their practical application. In this research, we have utilized a 3D Hindmarsh-Rose model to construct a secure cryptosystem. The randomness of the chaotic map is assessed through standard analysis. The proposed system enhances security… More >

  • Open Access

    ARTICLE

    Asymmetric Key Cryptosystem for Image Encryption by Elliptic Curve over Galois Field

    Mohammad Mazyad Hazzazi1, Hafeez Ur Rehman2,*, Tariq Shah2, Hajra Younas2

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2033-2060, 2023, DOI:10.32604/cmc.2023.040629 - 30 August 2023

    Abstract Protecting the integrity and secrecy of digital data transmitted through the internet is a growing problem. In this paper, we introduce an asymmetric key algorithm for specifically processing images with larger bit values. To overcome the separate flaws of elliptic curve cryptography (ECC) and the Hill cipher (HC), we present an approach to picture encryption by combining these two encryption approaches. In addition, to strengthen our scheme, the group laws are defined over the rational points of a given elliptic curve (EC) over a Galois field (GF). The exclusive-or (XOR) function is used instead of More >

  • Open Access

    ARTICLE

    3D Model Encryption Algorithm by Parallel Bidirectional Diffusion and 1D Map with Sin and Logistic Coupling

    Yongsheng Hu*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 1819-1838, 2023, DOI:10.32604/csse.2023.040729 - 28 July 2023

    Abstract 3D models are essential in virtual reality, game development, architecture design, engineering drawing, medicine, and more. Compared to digital images, 3D models can provide more realistic visual effects. In recent years, significant progress has been made in the field of digital image encryption, and researchers have developed new algorithms that are more secure and efficient. However, there needs to be more research on 3D model encryption. This paper proposes a new 3D model encryption algorithm, called the 1D map with sin and logistic coupling (1D-MWSLC), because existing digital image encryption algorithms cannot be directly applied… More >

Displaying 1-10 on page 1 of 48. Per Page