Content protection is considered as an important issue in today’s world. Therefore, encryption of such contents is a challenging task for researchers. They are focusing on protection of valuable data such as image, video, and audio against different attacks from eavesdroppers. In this paper, we proposed an enhanced version of Fawad et al.’s scheme to fulfill essential needs of a secure image encryption algorithm. The proposed cryptosystem is resistant against many attacks like brute force, differential and statistical. To quantify the quality of the proposed scheme, instead of visual inspection, the proposed scheme is analyzed through various tests, such as correlation coefficient, information entropy, Number of Pixel Change Rate (NPCR) and...
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the subs...
In the past few years, several encryption algorithms based on chaotic systems have been proposed as ...
In the digital era, most types of transmitted data over the Internet are images. These ima...
Content protection is considered as an important issue in today’s world. Therefore, encryption of su...
Due to social networks, demand for sharing multimedia data is significantly increased in last decade...
Nowadays, images became one of the most types of transmitted data through Internet. Some of these im...
With the evolution of technologies, the size of an image data has been significantly increased. Howe...
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is prop...
The security of digital information has become a major issue during the last three decades. Encrypti...
As the information trade in electronic way is quickly expanding, it is likewise similarly vital to s...
In this paper, a new simple and fast algorithm for image encryption is proposed. It exploits the sca...
In the era of information technology, users had to send millions of images back and forth daily. It'...
This study proposes a new image encryption scheme based on a generalized Arnold map and Rivest–Shami...
We present a novel image encryption algorithm using Chebyshev polynomial based on permutation and su...
Internet plays an important role in circulating a huge amount of multimedia. An example of this mult...
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the subs...
In the past few years, several encryption algorithms based on chaotic systems have been proposed as ...
In the digital era, most types of transmitted data over the Internet are images. These ima...
Content protection is considered as an important issue in today’s world. Therefore, encryption of su...
Due to social networks, demand for sharing multimedia data is significantly increased in last decade...
Nowadays, images became one of the most types of transmitted data through Internet. Some of these im...
With the evolution of technologies, the size of an image data has been significantly increased. Howe...
In this paper, a novel image encryption scheme based on two rounds of substitution–diffusion is prop...
The security of digital information has become a major issue during the last three decades. Encrypti...
As the information trade in electronic way is quickly expanding, it is likewise similarly vital to s...
In this paper, a new simple and fast algorithm for image encryption is proposed. It exploits the sca...
In the era of information technology, users had to send millions of images back and forth daily. It'...
This study proposes a new image encryption scheme based on a generalized Arnold map and Rivest–Shami...
We present a novel image encryption algorithm using Chebyshev polynomial based on permutation and su...
Internet plays an important role in circulating a huge amount of multimedia. An example of this mult...
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the subs...
In the past few years, several encryption algorithms based on chaotic systems have been proposed as ...
In the digital era, most types of transmitted data over the Internet are images. These ima...