International audienceThe impact of confidentiality and privacy breaches are more pronounced when dealing with multimedia contents. One of the obvious techniques to counter these threats is the use of encryption. A number of algorithms for robust image encryption, targeted for real-time applications with tight resource constraints, has been proposed in the literature. In this paper, first, we analyze two recent cipher schemes for image contents, which are based on two rounds. We show that the schemes are designed to ensure maximum avalanche effect in the whole image by employing the chaining block code mode (CBC) in forward and backward directions. However, they do not lend themselves to parallel implementation and they have a problem with ...
International audienceRecently, the pervasiveness of multimedia contents raised serious security and...
International audienceThis paper proposes and investigates a Chaotic Cipher Block Chaining mode (CCB...
International audienceThe increasing usage of personal multimedia devices such as mobiles phones, sm...
International audienceThe impact of confidentiality and privacy breaches are more pronounced when de...
International audienceThe protection of multimedia content has become a key area of research, since ...
Abstract: Problem statement: The widespread use of image, audio and video data makes media content p...
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is prop...
The security of multimedia data transmitted over wireless networks is of increased interest. Encrypt...
The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited key s...
Due to social networks, demand for sharing multimedia data is significantly increased in last decade...
Nowadays, various image encryption schemes based on chaotic systems have been developed, each of the...
The popularization of 5G and the development of cloud computing further promote the application of i...
Abstract:- The image encryption is widely used to secure transmission of data in an open internet an...
With the fast progression of data exchange in an electronic way, information security is becoming mo...
This paper introduces an effective image encryption approach that merges a chaotic map and polynomia...
International audienceRecently, the pervasiveness of multimedia contents raised serious security and...
International audienceThis paper proposes and investigates a Chaotic Cipher Block Chaining mode (CCB...
International audienceThe increasing usage of personal multimedia devices such as mobiles phones, sm...
International audienceThe impact of confidentiality and privacy breaches are more pronounced when de...
International audienceThe protection of multimedia content has become a key area of research, since ...
Abstract: Problem statement: The widespread use of image, audio and video data makes media content p...
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is prop...
The security of multimedia data transmitted over wireless networks is of increased interest. Encrypt...
The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited key s...
Due to social networks, demand for sharing multimedia data is significantly increased in last decade...
Nowadays, various image encryption schemes based on chaotic systems have been developed, each of the...
The popularization of 5G and the development of cloud computing further promote the application of i...
Abstract:- The image encryption is widely used to secure transmission of data in an open internet an...
With the fast progression of data exchange in an electronic way, information security is becoming mo...
This paper introduces an effective image encryption approach that merges a chaotic map and polynomia...
International audienceRecently, the pervasiveness of multimedia contents raised serious security and...
International audienceThis paper proposes and investigates a Chaotic Cipher Block Chaining mode (CCB...
International audienceThe increasing usage of personal multimedia devices such as mobiles phones, sm...