2020
DOI: 10.3390/e22020180
|View full text |Cite
|
Sign up to set email alerts
|

A Bijective Image Encryption System Based on Hybrid Chaotic Map Diffusion and DNA Confusion

Abstract: Modern multimedia communications technology requirements have raised security standards, which allows for enormous development in security standards. This article presents an innovative symmetric cryptosystem that depends on the hybrid chaotic Lorenz diffusion stage and DNA confusion stage. It involves two identical encryption and decryption algorithms, which simplifies the implementation of transmitting and receiving schemes of images securely as a bijective system. Both schemes utilize two distinctive non-co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(30 citation statements)
references
References 51 publications
(59 reference statements)
0
26
0
Order By: Relevance
“…A comparison has been drawn in the Table 8. One can see that the proposed cryptosystem does better than [10], [15], [27], [51], [57] as far as entropy is considered for the Lena image.…”
Section: Information Entropy Analysismentioning
confidence: 94%
See 2 more Smart Citations
“…A comparison has been drawn in the Table 8. One can see that the proposed cryptosystem does better than [10], [15], [27], [51], [57] as far as entropy is considered for the Lena image.…”
Section: Information Entropy Analysismentioning
confidence: 94%
“…and U ACI for the selected images are 99.6027% and 33.4908% respectively which expressly prove that the potential encryption scheme is sufficiently potent to withstand the attacks of N P CR and U ACI which are differential in character. Further Table 10 draws a comparison of the metrics of the proposed scheme for the Lena image with some other algorithms [10], [15], [27], [51], [57]. Clearly, the proposed method has the better values of N P CR and U ACI than [51] and [15], [51], [57] respectively.…”
Section: E Differential Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…A good image cipher is expected to distribute the pixels of the given image randomly to defy the varied attacks. The concept of local Shannon entropy (LSE) represents a relatively stricter expression of the randomness of the image pixels [55]. For the given image img, if k non-overlapping blocks S 1 , S 2 ,...., S k with T B pixels are selected randomly, then the LSE is defined mathematically as…”
Section: F Local Shannon Entropymentioning
confidence: 99%
“…One of the dominant trends in encryption techniques is chaos-based encryption [ 15 , 16 , 17 , 18 , 19 , 20 ]. The reason for this dominance is that the chaos-based encryption schemes are highly sensitive to the initial parameters.…”
Section: Introductionmentioning
confidence: 99%