Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today’s digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA algorithm, homomorphic encryption, and chaotic maps, specifically the sine and logistic map, alongside the self-similar properties of the fractal Sierpinski triangle. The proposed fractal-based hybrid cryptosystem leverages Paillier encryption for maintaining security and privacy, while the chaotic maps introduce randomness, periodicity, and robustness. Simultaneously, the fractal Sierpinski triangle generates intricate shapes at different scales, resulting in a substantially expanded key space and heig...
This paper proposes a fractal-based image encryption algorithm which follows permutation-substitutio...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
Chaos-based encryption algorithms offer many advantages over conventional cryptographic algorithms, ...
A chaos-based cryptosystem has been suggested and investigated since last decade because of its sens...
An increasing demand of secure data transmission over internet leads to the challenge of implementin...
Chaos-based encryption schemes have attracted many researchers around the world in the digital image...
Nowadays, various image encryption schemes based on chaotic systems have been developed, each of the...
Local fractional calculus (fractal calculus) plays a crucial role in applications, especially in com...
Digital images are an important aspect of multimedia communication in today's data transmission envi...
Insecure communication in digital image security and image storing are considered as important chall...
Cryptography today is assumed as the study of techniques and applications of securing the integrity ...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
Cryptographic applications such as online banking, and securing medical and military data require th...
During the last two decades various chaotic image encryption algorithms have been proposed, but most...
This paper proposes a fractal-based image encryption algorithm which follows permutation-substitutio...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
Chaos-based encryption algorithms offer many advantages over conventional cryptographic algorithms, ...
A chaos-based cryptosystem has been suggested and investigated since last decade because of its sens...
An increasing demand of secure data transmission over internet leads to the challenge of implementin...
Chaos-based encryption schemes have attracted many researchers around the world in the digital image...
Nowadays, various image encryption schemes based on chaotic systems have been developed, each of the...
Local fractional calculus (fractal calculus) plays a crucial role in applications, especially in com...
Digital images are an important aspect of multimedia communication in today's data transmission envi...
Insecure communication in digital image security and image storing are considered as important chall...
Cryptography today is assumed as the study of techniques and applications of securing the integrity ...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
Cryptographic applications such as online banking, and securing medical and military data require th...
During the last two decades various chaotic image encryption algorithms have been proposed, but most...
This paper proposes a fractal-based image encryption algorithm which follows permutation-substitutio...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
Chaos-based encryption algorithms offer many advantages over conventional cryptographic algorithms, ...