-
21
-
22
-
23
-
24
-
25
Threshold encryption flow.
Published 2025“…Through ciphertext fragment verification algorithms and Lagrange interpolation-based key reconstruction, the framework enables secure query decryption and service matching in untrusted third-party environments, guaranteeing information security, integrity, and non-repudiation. …”
-
26
pone.0314656.t002 - Privacy-preserving method for face recognition based on homomorphic encryption
Published 2025Subjects: -
27
pone.0314656.t001 - Privacy-preserving method for face recognition based on homomorphic encryption
Published 2025Subjects: -
28
-
29
Comparison of correlation coefficients of adjacent pixels using different encryption methods.
Published 2025Subjects: -
30
-
31
-
32
Example of shift rows encryption.
Published 2025“…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …”
-
33
-
34
-
35
-
36
Encrypted and decrypted images.
Published 2025“…Evaluated using multiple chaos performance metrics, the 2D-SQSM demonstrates high Lyapunov exponents, and sample entropy, with chaotic characteristics superior to some advanced chaotic maps proposed in recent years. Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. …”
-
37
Paillier homomorphic encryption and decryption.
Published 2024“…To address these challenges, this paper proposes a federated learning-based intrusion detection algorithm (NIDS-FGPA) that utilizes gradient similarity model aggregation. …”
-
38
Image Encryption Flow Chart.
Published 2025“…Evaluated using multiple chaos performance metrics, the 2D-SQSM demonstrates high Lyapunov exponents, and sample entropy, with chaotic characteristics superior to some advanced chaotic maps proposed in recent years. Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. …”
-
39
-
40