2015
DOI: 10.1007/s11071-015-2392-7
|View full text |Cite
|
Sign up to set email alerts
|

A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
98
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 299 publications
(101 citation statements)
references
References 37 publications
2
98
0
1
Order By: Relevance
“…With the development of bioinformatics, some image encryption algorithms based on deoxyribonucleic acid (DNA) have emerged since Adleman completed the first experiment on DNA computing [28], due to the properties of DNA: massive parallelism, huge storage, and ultralow power consumption [29][30][31][32][33][34]. Typically, DNA-based image encryption consists of three steps: DNA encoding, DNA operations, and DNA decoding.…”
Section: Introductionmentioning
confidence: 99%
“…With the development of bioinformatics, some image encryption algorithms based on deoxyribonucleic acid (DNA) have emerged since Adleman completed the first experiment on DNA computing [28], due to the properties of DNA: massive parallelism, huge storage, and ultralow power consumption [29][30][31][32][33][34]. Typically, DNA-based image encryption consists of three steps: DNA encoding, DNA operations, and DNA decoding.…”
Section: Introductionmentioning
confidence: 99%
“…The SHA-3 function is also called the hash function [21], which is the most basic components in modern cryptosystem, and the input data is variable length and the output is fixed length. Messages can be generated with hash functions to generate a message digest that is appended to a message or stored with a message to prevent the message from being tampered with in transit and storage.…”
Section: The Key Generation Of Hyper-chaos Systemmentioning
confidence: 99%
“…Guesmi et al. proposed a novel image‐encryption algorithm based on a hybrid model of DNA masking, a secure hash algorithm (SHA‐2), and the Lorenz system . The study used DNA sequences and operations, along with the chaotic Lorenz system, to strengthen the cryptosystem.…”
Section: Related Workmentioning
confidence: 99%
“…Guesmi et al proposed an ovel image-encryption algorithm based on ah ybrid model of DNA masking, as ecure hash algorithm (SHA-2), and the Lorenzs ystem. [17] The study used DNA sequences ando perations, along with the chaotic Lorenz system,t os trengthen the cryptosystem. The significant advantages of this approach are improved information entropy, which is the most important feature of randomness, to provide resistance against varioust ypical attacks and to give good experimental results.…”
Section: Related Workmentioning
confidence: 99%