2020
DOI: 10.24996/ijs.2020.61.9.24
|View full text |Cite
|
Sign up to set email alerts
|

A New Beta Chaotic Map with DNA Encoding for Color Image Encryption

Abstract: Images hold important information, especially in military and commercial surveillance as well as in industrial inspection and communication. Therefore, the protection of the image from abuse, unauthorized access, and damage became a significant demand. This paper introduces a new Beta chaotic map for encrypting and confusing the color image with Deoxyribonucleic Acid (DNA) sequence. First, the DNA addition operation is used for diffusing each component of the plain image. Then, a new Beta chaotic map is used f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…The proposed method was tested on a group of colored images: Lena, Baboon, Barbara, and Pepper of size (256×256). In the permutation stage, we used three registers of different (29,31,33) and different (13, 7, 2), (3, 2, 1), (22, 13, 11,) respectively, and each register had a unique initial value(seed). The number of sequences bits required to generate each number depended on the number of pixels in one-half of the image size.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed method was tested on a group of colored images: Lena, Baboon, Barbara, and Pepper of size (256×256). In the permutation stage, we used three registers of different (29,31,33) and different (13, 7, 2), (3, 2, 1), (22, 13, 11,) respectively, and each register had a unique initial value(seed). The number of sequences bits required to generate each number depended on the number of pixels in one-half of the image size.…”
Section: Resultsmentioning
confidence: 99%
“…In the begging, the inputting color image is divided into two equal parts (upper UP and lower LW) with size Sk. Second, using LFSRs that comprise three registers with different lengths (29,31,33) and different taps (2,7,13), (1,2,3), (11,13,22), respectively, key K is generated that contains non-repetitive random numbers with size Sk. The same key is used to redistribute the locations of the pixels in each part.…”
Section: Changing the Pixel's Position (Confusion)mentioning
confidence: 99%
“…It illustrates the commutative quadratic fault (pixel changes) after comparing 2 images, the equation of MSE is [16]:…”
Section: Mean Square Error (Mse)mentioning
confidence: 99%
“…In modern image encryption methods, the chaos theory is frequently used, such as in [29,20,34]. Chaos theory is one of the nonlinear mathematical models for dynamical systems, and one of its advantages is that it can be handled smoothly on electronic devices.…”
Section: Introductionmentioning
confidence: 99%
“…The logistic map [23] is among the simplest nonlinear chaotic maps and is therefore of particular interest to researchers. In 2018, a one-dimensional logistic map together with another chaotic map was involved in the generation of a key sequence for encrypting an image [29]. In 2019, a three-dimensional logistic map was modified to be the first step of the proposed image encryption algorithm to generate keystream by it [20].…”
Section: Introductionmentioning
confidence: 99%