Open Access
Issue
E3S Web Conf.
Volume 601, 2025
The 3rd International Conference on Energy and Green Computing (ICEGC’2024)
Article Number 00002
Number of page(s) 9
DOI https://doi.org/10.1051/e3sconf/202560100002
Published online 16 January 2025
  1. H. Rrghout, M. Kattass, Y. Qobbi, N. Benazzi, A. Jarjar, and A. Benazzi, ‘Robust Image Encryption Algorithm Using a New Variant of Hill Cipher’, in Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security, New York, NY, USA: ACM, May 2023, pp. 1–6. doi: 10.1145/3607720.3607750. [Google Scholar]
  2. M. A. Lone and S. Qureshi, ‘RGB image encryption based on symmetric keys using Arnold transform, 3D chaotic map and affine hill cipher’, Optik (Stuttg), vol. 260, p. 168880, (Jun. 2022), doi: 10.1016/j.ijleo.2022.168880. [CrossRef] [Google Scholar]
  3. M. Kattass, H. Rrghout, M. Jarjar, A. Jarjar, F. Gmira, and A. Benazzi, ‘Chaotic Image Encryption Using an Improved Vigenere Cipher and a Crossover Operator’, 2024, pp. 181–191. doi: 10.1007/978-3-031-53717-2_17. [Google Scholar]
  4. H. El Bourakkadi, A. Chemlal, H. Tabti, M. Kattass, A. Jarjar, and A. Benazzi, ‘Improved vigenere using affine functions surrounded by two genetic crossovers for image encryption’, Indonesian Journal of Electrical Engineering and Computer Science, vol. 34, no. 3, p. 1787, (Jun. 2024), doi: 10.11591/ijeecs.v34.i3.pp1787-1799. [CrossRef] [Google Scholar]
  5. H. El Bourakkadi, A. Chemlal, H. Tabti, M. Kattass, A. Jarjar, and A. Benazzi, ‘Improved Vigenere approach incorporating pseudorandom affine functions for encrypting color images’, International Journal of Electrical and Computer Engineering (IJECE), vol. 14, no. 3, p. 2684, (Jun. 2024), doi: 10.11591/ijece.v14i3.pp2684-2694. [CrossRef] [Google Scholar]
  6. H. Tabti, H. El Bourakkadi, A. Chemlal, A. Jarjar, S. Najah, and K. Zenkouar, ‘Novel cryptosystem integrating the Vigenere cipher and one Feistel round for color image encryption’, International Journal of Electrical and Computer Engineering (IJECE), vol. 14, no. 5, p. 5701, (Oct. 2024), doi: 10.11591/ijece.v14i5.pp5701-5714. [CrossRef] [Google Scholar]
  7. A. Chemlal, H. El Bourakkadi, H. Tabti, M. Jarjar, A. Jarjar, and A. Benazzi, ‘Image encryption through two rounds of Feistel operating at the bit level’, in 2024 International Conference on Circuit, Systems and Communication (ICCSC), IEEE, Jun. 2024, pp. 1–6. doi: 10.1109/ICCSC62074.2024.10616710. [Google Scholar]
  8. J. G. Sekar, E. Periyathambi, and A. Chokkalingam, ‘Hybrid chaos-based image encryption algorithm using Chebyshev chaotic map with deoxyribonucleic acid sequence and its performance evaluation’, International Journal of Electrical and Computer Engineering (IJECE), vol. 13, no. 6, p. 6952, (Dec. 2023), doi: 10.11591/ijece.v13i6.pp6952-6963. [CrossRef] [Google Scholar]
  9. H. Tabti, H. EL Bourakkadi, A. Chemlal, A. Jarjar, K. Zenkouar, and S. Najah, ‘Genetic Crossover at the RNA Level for Secure Medical Image Encryption’, International Journal of Safety and Security Engineering, vol. 14, no. 1, pp. 201–216, (Feb. 2024). [CrossRef] [Google Scholar]
  10. S. Li, Y. Zhao, B. Qu, and J. Wang, ‘Image scrambling based on chaotic sequences and Veginere cipher’, Multimed Tools Appl, vol. 66, no. 3, pp. 573–588, (Oct. 2013), doi: 10.1007/s11042-012-1281-z. [CrossRef] [Google Scholar]
  11. A. JarJar, ‘New chaotic map development and its application in encrypted color image’, Journal of Multimedia Information System, vol. 8, no. 2, pp. 131–142, (Jun. 2021), doi: 10.33851/JMIS.2021.8.2.131. [CrossRef] [Google Scholar]
  12. S. R. Victor Juvvanapudi, P. Rajesh Kumar, and K. V. V. Satyanarayana Reddy, ‘Hybrid chaotic map with L-shaped fractal Tromino for image encryption and decryption’, International Journal of Electrical and Computer Engineering (IJECE), vol. 14, no. 1, p. 389, (Feb. 2024), doi: 10.11591/ijece.v14i1.pp389-397. [CrossRef] [Google Scholar]
  13. S. Taha Allawi and D. Riadh Alshibani, ‘Color Image Encryption Using LFSR, DNA, and 3D Chaotic Maps’, International journal of electrical and computer engineering systems, vol. 13, no. 10, pp. 885–893, (Dec. 2022), doi: 10.32985/ijeces.13.10.4. [CrossRef] [Google Scholar]
  14. S. T. Allawi and N. A. A. Mustafa, ‘Image encryption based on combined between linear feedback shift registers and 3D chaotic maps’, Indonesian Journal of Electrical Engineering and Computer Science, vol. 30, no. 3, p. 1669, (Jun. 2023), doi: 10.11591/ijeecs.v30.i3.pp1669-1677. [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.