Subject Areas : Journal of Optoelectronical Nanostructures
Zahra Kaviyani 1 , Mahnaz Mohammadi 2 , abbas kamaly 3
1 - Department of Electrical Engineering Telecommunications, Faculty of Engineering Sciences, Shiraz Branch, Islamic Azad University, Shiraz, Iran
2 - Department of Electrical Engineering Telecommunications, Faculty of Engineering Sciences, Shiraz Branch, Islamic Azad University, Shiraz, Iran
3 - Department of Electrical Engineering, Faculty of Engineering Sciences, Fasa Branch, Islamic Azad University, Fasa, Iran
Keywords:
Abstract :
[1] Ning, H., Liu, H., Ma, J., Yang, L. T., & Huang, R.. Cybermatics: Cyber–physical–social–thinking hyperspace based science and technology. Future generation computer systems, 56, (2016) 504-522.
Available:https://www.sciencedirect.com/science/article/abs/pii/S0167739X15002356
[2] Amor, A. B., Abid, M., & Medb, A. Secure blockchain-based e-learning scheme. IEEE Access, 8, (2020) 31920-31933.
Available:https://ieeexplore.ieee.org/ielaam/6287639/8600701/8917991-aam.pdf
[3] Ding, S., Li, C., & Li, H. A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access, 6, (2018) 27336-27345.
Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8359407
[4] Zhang, Y., Li, J., & Yan, H. Constant size ciphertext distributed CP-ABE scheme with privacy protection and fully hiding access structure. IEEE Access, 7, (2019) 47982-47990.
Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8681522
[5] Ning, J., Cao, Z., Dong, X., & Wei, L. White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Transactions on Dependable and Secure Computing, 15(5), (2016) 883-897.
[6] Chuman, T., Sirichotedumrong, W., & Kiya, H. Encryption-then-compression systems using grayscale-based image encryption for jpeg images. IEEE Transactions on Information Forensics and security, 14(6), (2018)1515-1525. Available: https://ieeexplore.ieee.org/document/8537968
[7] Yang, Y. G., Zou, L., Zhou, Y. H., & Shi, W. M. Visually meaningful encryption for color images by using Qi hyper-chaotic system and singular value decomposition in YCbCr color space. Optik, 213, (2020) 16442 Available:https://www.sciencedirect.com/science/article/abs/pii/S0030402620302564
[8] Ghadirli, H. M., Nodehi, A., & Enayatifar, R. An overview of encryption algorithms in color images. Signal Processing, 164, (2019)163-185.
Available:https://www.sciencedirect.com/science/article/abs/pii/S016516841930218X
[9] Farah, M. B., Farah, A., & Farah, T. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics, (2019) 1-24.
Available:https://www.hindawi.com/journals/complexity/2020/9597619/
[10] Khan, P. W., & Byun, Y. A blockchain-based secure image encryption scheme for the industrial Internet of Things. Entropy, 22(2), (2020) 175.
Available: https://www.mdpi.com/1099-4300/22/2/175
[11] Mondal, B., Kumar, P., & Singh, S. A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimedia Tools and Applications, 77(23), (2018) 31177-31198.
Available: https://link.springer.com/article/10.1007/s11042-018-6214-z
[12] Chowdhary, C. L., Patel, P. V., Kathrotia, K. J., Attique, M., Perumal, K., & Ijaz, M. F. Analytical study of hybrid techniques for image encryption and decryption. Sensors, 20(18), (2020) 5162.
Available: https://www.mdpi.com/1424-8220/20/18/5162
[13] Wang, J., Zhi, X., Chai, X., & Lu, Y. Chaos-based image encryption strategy based on random number embedding and DNA-level self-adaptive permutation and diffusion. Multimedia Tools and Applications, 1-36. (2021)
Available: https://link.springer.com/article/10.1007/s11042-020-10413-7
[14] Bashier, E., & Jabeur, T. B. An Efficient Secure Image Encryption Algorithm Based on Total Shuffling, Integer Chaotic Maps and Median Filter (No. 5028). (2021) EasyChair.
Available: https://jisis.org/article/jisis-2021-vol11-no2-04/69464/
[15] Zhang, L., Liang, P., & Mu, Y. Improving privacy-preserving and security for decentralized key-policy attributed-based encryption. IEEE Access, 6, (2018) 12736-12745.
Available :https://ro.uow.edu.au/cgi/viewcontent.cgi?article=228
[16] Alshehri, M., & Panda, B. Minimizing Data Breach by a Malicious Blockchain Node within a Blockchain Federation. 7th IEEE International Conference on Cyber Security and Cloud Computing (2020, August) (pp. 36-43). Available :https://www.researchgate.net/publication/343756473
[17] Ismail, S. M., Said, L. A., Radwan, A. G., Madian, A. H., & Abu-ElYazeed, M. F. A novel image encryption system merging fractional-order edge detection and generalized chaotic maps. Signal Processing, 167, (2020) 107280.
Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9387309
[18] Ahmad, M., Al Solami, E., Wang, X. Y., Doja, M. N., Beg, M. M., & Alzaidi, A. Cryptanalysis of an image encryption algorithm based on combined chaos for a BAN system, and improved scheme using SHA-512 and hyperchaos. Symmetry, 10(7), (2018) 266.
Available:https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9465166R
[19] Yahyazadeh , Z.Hashempour , Effect of Hydrostatic Pressure on Optical Absorption Coefficient of InGaN/GaN of Multiple Quantum Well Solar Cells , (Spring 2021). Vol. 6, No. 2.
[20] M. Mohammadi , A.Zolghadr , M. Pourmina , Comparison of two Public Key Cryptosystems, Summer 2018 / Vol. 3, No. 3.
[21] M.Momeni , M Javadian Sarraf , F.Khatib ,Design of high sensitivity and high FoM refractive index biosensor based on 2D-photonic crystal, Winter 2021 / Vol. 6, No. 1.
[22] M.Rajaee, S. Rabiee , Analysis and Implementation of a New Method to Increase the Efficiency of Photovoltaic Cells by Applying a Dual Axis Sun Tracking System and Fresnel Lens Array, Summer 2021 / Vol. 6, No. 3.
[23] Sh.Shahi, P. Momayezan , M. Ranjbaran, S. Wadi Harun, Observation of Raman Gain in Reduced Length of Bismuth Erbium Doped Fiber, Summer 2020 / Vol. 5, No. 3.
[24] Wang, Q., Peng, L., Xiong, H., Sun, J., & Qin, Z. Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access, 6, (2017) 760-771.
Available: https://ieeexplore.ieee.org/document/8119793
[25] Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. Blockchain computing for the internet of things: Security and privacy issues. IEEE Internet Computing, 21(2), (2017) 34-42.
Available:https://www.sciencedirect.com/science/article/pii/S187705091830872X