Chaotic map technique for enhancement security for android mobile system based on image encryption DOI Open Access
Kawther Thabt Saleh, Nisreen Abd Alhadi Jabr, Iman Hussein AL-Qinani

и другие.

Indonesian Journal of Electrical Engineering and Computer Science, Год журнала: 2022, Номер 27(3), С. 1698 - 1698

Опубликована: Авг. 10, 2022

Network <span>security continues to be the priority of many organizations. To ensure protection their data, they pay great attention Encryption systems. Moreover, because enormous developments in networks connection particularly internet which has used by several people share a variety data kinds. The security been significant issue. As result, there is focus using methods decryption and encryption. Numerous encryption techniques have become advanced preserve protection, chaotic systems are one these widely recent years, where were proposed use map for encrypt images reason that characteristics e.g., random action unpredictability initial conditions sensitivity. In this paper, proof authentication sent information algorithm provide cipher text hidden image then send another user. This approach applied cellular operating system environment (android). Thus, sending receiving will safe secure. tested on different types mobile. gives good results.</span>

Язык: Английский

Quantum Computing for Healthcare: A Review DOI Creative Commons
Raihan Ur Rasool, Hafiz Farooq Ahmad, Wajid Rafique

и другие.

Future Internet, Год журнала: 2023, Номер 15(3), С. 94 - 94

Опубликована: Фев. 27, 2023

In recent years, the interdisciplinary field of quantum computing has rapidly developed and garnered substantial interest from both academia industry due to its ability process information in fundamentally different ways, leading hitherto unattainable computational capabilities. However, despite potential, full extent computing’s impact on healthcare remains largely unexplored. This survey paper presents first systematic analysis various capabilities enhancing systems, with a focus potential revolutionize compute-intensive tasks such as drug discovery, personalized medicine, DNA sequencing, medical imaging, operational optimization. Through comprehensive existing literature, we have taxonomies across dimensions, including background enabling technologies, applications, requirements, architectures, security, open issues, future research directions, providing panoramic view paradigm for healthcare. Our aims aid new experienced researchers by helping them understand current landscape, identifying opportunities challenges, making informed decisions when designing architectures applications

Язык: Английский

Процитировано

103

Exploiting Newly Designed Fractional-Order 3D Lorenz Chaotic System and 2D Discrete Polynomial Hyper-Chaotic Map for High-Performance Multi-Image Encryption DOI Creative Commons
Wei Feng,

Quanwen Wang,

Hui Liu

и другие.

Fractal and Fractional, Год журнала: 2023, Номер 7(12), С. 887 - 887

Опубликована: Дек. 16, 2023

Chaos-based image encryption has become a prominent area of research in recent years. In comparison to ordinary chaotic systems, fractional-order systems tend have greater number control parameters and more complex dynamical characteristics. Thus, an increasing researchers are introducing enhance the security chaos-based encryption. However, their suggested algorithms still suffer from some security, practicality, efficiency problems. To address these problems, we first constructed new 3D Lorenz system 2D sinusoidally constrained polynomial hyper-chaotic map (2D-SCPM). Then, elaborately developed multi-image algorithm based on 2D-SCPM (MIEA-FCSM). The introduction with fourth parameter not only enables MIEA-FCSM significantly large key space but also enhances its overall security. Compared alternatives, structure is simpler conducive application implementation. our proposed MIEA-FCSM, multi-channel fusion initially reduces pixels one-sixth original. Next, after two rounds plaintext-related random substitution, dynamic diffusion, fast scrambling, fused pixel matrix eventually encrypted into ciphertext one. According numerous experiments analyses, obtained excellent scores for (2541), correlation coefficients (<0.004), information entropy (7.9994), NPCR (99.6098%), UACI (33.4659%). Significantly, attained average rate as high 168.5608 Mbps. Due superiority system, 2D-SCPM, targeted designs, outperforms many recently reported leading algorithms.

Язык: Английский

Процитировано

75

A comprehensive survey on image encryption: Taxonomy, challenges, and future directions DOI
Morteza SaberiKamarposhti, Amirabbas Ghorbani, Mehdi Yadollahi

и другие.

Chaos Solitons & Fractals, Год журнала: 2023, Номер 178, С. 114361 - 114361

Опубликована: Дек. 5, 2023

Язык: Английский

Процитировано

57

Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques DOI Creative Commons
Abid Mehmood, Arslan Shafique, Moatsum Alawida

и другие.

IEEE Access, Год журнала: 2024, Номер 12, С. 27530 - 27555

Опубликована: Янв. 1, 2024

In the contemporary landscape, where a huge amount of data plays vital role, importance strong and robust cybersecurity measures has become increasingly paramount. This research proposes review extensively explores techniques within domain machine/deep learning quantum techniques, with particular focus on cryptographic methods methodologies applied to image encryption. The proposed survey covers range including random number generation, secure transmission images, watermarking through methods, steganography. Moreover, it encryption, which integrates adversarial neural networks, deep machine learning, transformation chaotic networks that can be used digital from cyber attacks. Our extends beyond highlighting advances in investigating vulnerabilities existing techniques. By identifying challenges weaknesses, potential solutions are also presented, establishing foundation for future recommendations. These suggestions address overcome observed aim extensive analysis is provide understanding innovative diverse approaches domain. Simultaneously, aims create roadmap counter threats challenges.

Язык: Английский

Процитировано

21

A survey of image encryption algorithms based on chaotic system DOI
Pengfei Fang, Han Liu, Chengmao Wu

и другие.

The Visual Computer, Год журнала: 2022, Номер 39(5), С. 1975 - 2003

Опубликована: Апрель 7, 2022

Язык: Английский

Процитировано

52

An efficient structure for designing a nano-scale fault-tolerant 2:1 multiplexer based on quantum-dot cellular automata DOI
Saeid Seyedi, Nima Jafari Navimipour

Optik, Год журнала: 2021, Номер 251, С. 168409 - 168409

Опубликована: Ноя. 28, 2021

Язык: Английский

Процитировано

32

CloudSec: A Lightweight and Agile Approach to Secure Medical Image Transmission in the Cloud Computing Environment DOI
Avijit Mondal, Pinaki Sankar Chatterjee

SN Computer Science, Год журнала: 2024, Номер 5(2)

Опубликована: Янв. 27, 2024

Язык: Английский

Процитировано

5

A secure medical image encryption algorithm for IoMT Using a Quadratic-Sine Chaotic Map and pseudo-parallel confusion-diffusion mechanism DOI
Ali Mansouri,

Pin Sun,

Chengzhi Lv

и другие.

Expert Systems with Applications, Год журнала: 2025, Номер 270, С. 126521 - 126521

Опубликована: Янв. 16, 2025

Язык: Английский

Процитировано

0

Quantum computing in Healthcare 5.0 DOI
Amira S. Ashour, Deepika Koundal

Elsevier eBooks, Год журнала: 2025, Номер unknown, С. 43 - 62

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

0

Enabling Quantum Privacy and Security by Design: Imperatives for Contemporary State‐of‐the‐Art in Quantum Software Engineering DOI Creative Commons
Vita Santa Barletta, Danilo Caivano, Anibrata Pal

и другие.

Journal of Software Evolution and Process, Год журнала: 2025, Номер 37(2)

Опубликована: Фев. 1, 2025

ABSTRACT With the advent of Quantum Computing and its exponential research endeavors in past couple decades, we are looking at a Golden Era Computing. We transitioning into an age Hybrid Classical‐Quantum Computers, where quantum computational resources selectively harnessed for resource‐intensive tasks. On one hand, promises immense future innovation, it also comes with privacy security challenges. To date, Privacy by Design (PbD) Security (SbD) frameworks guidelines Software Engineering (QSE) domain still nebulous, there no comprehensive studies on same. In this study, therefore, identify current state‐of‐the‐art relevant literature investigate principles PbD SbD QSE. This is first study to Furthermore, identified gaps literature, which were extended action points robust SbD. recognize crucial role researchers, academics, professionals field conducting more empirical shaping

Язык: Английский

Процитировано

0