Demand for data security is increasing as information technology advances. Encryption technology based on biometrics has advanced significantly to meet more convenient and secure needs. Because of the stability of face traits and the difficulty of counterfeiting, the iris method has become an essential research object in data security research. This study proposes a revolutionary face feature encryption technique that combines picture optimization with cryptography and deep learning (DL) architectures. To improve the security of the key, an optical chaotic map is employed to manage the initial standards of the 5D conservative chaotic method. A safe Crypto General Adversarial neural network and chaotic optical map are provided to finish the ...
The rapid evolution of imaging and communication technologies has transformed images into a widespre...
This paper proposes a new image encryption algorithm. First, time-domain and frequency-domain featur...
Due to dramatic enhancement in computers and communications and due to huge use of electronic media,...
Chaos-based image encryption schemes are applied widely for their cryptographic properties. However,...
Face recognition has become ubiquitous for authentication or security purposes. Meanwhile, there are...
WOS:000748678300002A secure and reliable image encryption scheme is presented, which depends on a no...
Safeguarding the identity of people in photographs or videos published through social networks or te...
Abstract: Cryptography is the exchange of information among the users without leakage or loses of in...
Abstract With the development of information technology, the demand for information security is incr...
Abstract In recent years, meaningful visual image encryption schemes that the plain image is compres...
Over the last twenty years, steganography has attracted in the consideration of numerous informatio...
Six algorithms that design secrecy keys are used for digital image encryption. The privacy keys gene...
Copyright © 2014 Ali Soleymani et al. This is an open access article distributed under the Creative ...
We live in technological age development’s where many important data transmitted electronically from...
In this article, a safe communication system is proposed that implements one or more portable device...
The rapid evolution of imaging and communication technologies has transformed images into a widespre...
This paper proposes a new image encryption algorithm. First, time-domain and frequency-domain featur...
Due to dramatic enhancement in computers and communications and due to huge use of electronic media,...
Chaos-based image encryption schemes are applied widely for their cryptographic properties. However,...
Face recognition has become ubiquitous for authentication or security purposes. Meanwhile, there are...
WOS:000748678300002A secure and reliable image encryption scheme is presented, which depends on a no...
Safeguarding the identity of people in photographs or videos published through social networks or te...
Abstract: Cryptography is the exchange of information among the users without leakage or loses of in...
Abstract With the development of information technology, the demand for information security is incr...
Abstract In recent years, meaningful visual image encryption schemes that the plain image is compres...
Over the last twenty years, steganography has attracted in the consideration of numerous informatio...
Six algorithms that design secrecy keys are used for digital image encryption. The privacy keys gene...
Copyright © 2014 Ali Soleymani et al. This is an open access article distributed under the Creative ...
We live in technological age development’s where many important data transmitted electronically from...
In this article, a safe communication system is proposed that implements one or more portable device...
The rapid evolution of imaging and communication technologies has transformed images into a widespre...
This paper proposes a new image encryption algorithm. First, time-domain and frequency-domain featur...
Due to dramatic enhancement in computers and communications and due to huge use of electronic media,...