2020
DOI: 10.1007/s11042-020-08645-8
|View full text |Cite
|
Sign up to set email alerts
|

A multidimensional chaotic image encryption algorithm based on the region of interest

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 37 publications
(18 citation statements)
references
References 33 publications
0
17
0
1
Order By: Relevance
“…However, during this period, due to the restrictions of various governments, and the application of cryptography was generally limited to the government and military departments, the research on cryptography did not achieve much. Liu et al have well summarized the previous development of cryptography, thus widely spreading the idea of cryptography [12].…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, during this period, due to the restrictions of various governments, and the application of cryptography was generally limited to the government and military departments, the research on cryptography did not achieve much. Liu et al have well summarized the previous development of cryptography, thus widely spreading the idea of cryptography [12].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Where W and H are the Width and Height of the image and D(i, j) is defined as Liu, Y. et al, 2020 99.22 7.9920 You, L. et al, 2020 99.65 7.9457 Roy, S. et al, 2020 99.78 7.9646 Dagadu, J. et al, 2020 99.64 7.9972 Proposed work (Max) 99.65 7.9975 Table 1 shows the comparative analysis of proposed work and the existing algorithms in terms of NPCR and Entropy. The experiments results in this table shows that effectiveness of proposed work while using less key size comparative to the existing algorithms.…”
Section: Resultsmentioning
confidence: 99%
“…A new scheme is based on digit-level is described in [16]. For testing the proposed algorithm performance, [17][18][19][20][21][22][23][24][25] image encryption techniques are used. Session key based cryptographic algorithm is discussed in [26].…”
Section: Related Workmentioning
confidence: 99%