1.

Color Image Encryption using Random Password Seed and Linear Feed BackShift Register

Volume 14, Issue 1, March 2011, Pages 186-192
Ban N. Dhannoon; Najwan A. Hassan; Suhad Latef

2.

Digital Image Encryption by Random Pixel Selecting Using Chaotic Sequences

Volume 0, Issue 26, September 2018, Pages 228-236
Hikmat N. Abdullah; Hadi. T. Zeboon; Atheer J. Mansor

3.

Fast And Secure Image Encryption System For Real Time Applications And Mobile Communications

Volume 11, Issue 2, July 2015, Pages 19-31
Manaf Mohammed Ali

4.

Hyperchaotic technology-based efficient image encryption algorithm an overview.

Volume 17, Issue 2, December 2023, Pages 234-244
Kawthar M. Khalaf; Ali M. Sagheer

5.

Image Encryption Algorithm Based on Substitution Principle and Shuffling Scheme

Volume 38, 3B, December 2020, Pages 98-103
Atyaf Hamad; Alaa K. Farhan

6.

Image encryption based on s-box and 3D-chaotic maps and secure image transmission through ofdm in rayleigh fading channel

Volume 42, Issue 2, February 2024, Pages 288-297
Jenan A. Namuq; Fadhil S. Hasan; Alaa H. Ali

7.

Image Encryption using Resilient Boolean Function and DCT

Volume 29, Issue 12, September 2011, Pages 2551-2563
Hussam A. Darweesh; Ekbal H. Ali; Azhar Malik

8.

Images Encryption Using Chaos and Random Generation

Volume 34, 1B, January 2016, Pages 172-179
Yossra Hussain Ail; Zahraa A.H. Alobaidy

9.

Lagrange Interpolation and OcTree for 2D-3DImage Encryption

Volume 0, Issue 12, June 2017, Pages 203-221
Haider Kadhim Hoomod

10.

Lagrange Interpolation - OcTree for 2D-3D Chaotic Image Encryption

Volume 0, Issue 1, October 2017, Pages 281-298
Haider K. Hoomod; Shymaa M. Jameel; Huda A. Abul Jabbar

11.

Multi-level Security Based on Dynamic Magic Cube and Chaotic Maps

Volume 7, Issue 4, October 2017, Pages 106-124
Dhaher Abass Redha

12.

Pipelined Parallel Implementation of CryptosystemsBased on Advanced Encryption Standard

Volume 23, Issue 2, April 2015, Pages 44-55
Israa G. Mohammed; Shifaa A. Dawood

13.

Two Stage Text Encryption Using a Private Table of the Sumerian System

Volume 15, Issue 1, March 2020, Pages 18-33
Elham Hassan Aziz

14.

Visual Cryptography Vs Bit Level Secret Sharing For Image Encryption

Volume 28, Issue 7, March 2010, Pages 1340-1349
Musaab R. Abdulrazzaq



Journal Management System. Powered by ejournalplus.com