2020
DOI: 10.1007/s11042-020-09930-2
|View full text |Cite
|
Sign up to set email alerts
|

A novel and efficient amino acid codon based medical image encryption scheme colligating multiple chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…When combined with DNA encoding or wavelet transform, they contribute to improved security and performance in the encryption process. Tawfik et al [22] presented a secure and efficient medical image encryption scheme utilizing 2D-3D chaotic maps and DNA encoding, demonstrating its high security, robustness, and efficiency.…”
Section: Figure 2: Security Of Medical Images For Telemedicine: a Sys...mentioning
confidence: 99%
“…When combined with DNA encoding or wavelet transform, they contribute to improved security and performance in the encryption process. Tawfik et al [22] presented a secure and efficient medical image encryption scheme utilizing 2D-3D chaotic maps and DNA encoding, demonstrating its high security, robustness, and efficiency.…”
Section: Figure 2: Security Of Medical Images For Telemedicine: a Sys...mentioning
confidence: 99%
“…The Logistic map, also known as the insect population model in ecology [ 21 ], is a typical nonlinear chaotic system, which is highly sensitive to the initial state [ 1 ] and can produce complex chaotic behaviors [ 33 ]. This system has been widely used in the research field of medical image encryption [ 1 , 7 , 8 , 10 , 12 , 17 , 20 22 , 24 , 27 , 28 , 33 , 37 , 39 , 40 , 43 , 47 , 53 , 54 , 62 , 65 , 68 , 73 , 74 , 76 , 77 ]. The original 1-D Logistic chaotic map can be defined by the following Eq.…”
Section: Preliminariesmentioning
confidence: 99%
“…These approaches are very sensitive to initial conditions and are resistant to various brute attacks. DNA-based encryption technique is blended with chaotic maps, hash functions and other methods to provide better security [ 31 , 32 , 33 , 34 ]. Authors in [ 35 ] generated random sequence, using coupled map lattice and chaotic map, which are then combined with the DNA method for image encryption.…”
Section: Introductionmentioning
confidence: 99%