2013
DOI: 10.1007/s00530-013-0314-4
|View full text |Cite
|
Sign up to set email alerts
|

A novel image encryption based on hash function with only two-round diffusion process

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
44
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 153 publications
(48 citation statements)
references
References 50 publications
0
44
0
Order By: Relevance
“…However, the most-right column and bottom row must be padded to get a total number of rows and columns multiple of 8. Since the authors in [1] use 256 × 256 images for experimental purposes, we also consider, for simplicity reasons, 256 × 256 images to perform the security evaluation without loss of generality. We use the notations in [1].…”
Section: Norouzi's Image Encryption Schemementioning
confidence: 99%
See 4 more Smart Citations
“…However, the most-right column and bottom row must be padded to get a total number of rows and columns multiple of 8. Since the authors in [1] use 256 × 256 images for experimental purposes, we also consider, for simplicity reasons, 256 × 256 images to perform the security evaluation without loss of generality. We use the notations in [1].…”
Section: Norouzi's Image Encryption Schemementioning
confidence: 99%
“…The image encryption scheme proposed by Norouzi et al [1] is a symmetric scheme based on the application of two rounds of a diffusion process that is applied to each 8 × 8 patch composing the entire image. It uses a 512 bits secret key and it is designed for 256 grayscale images (grayscale images with a bit depth of 8 bits/pixel), of any size and aspect ratio.…”
Section: Norouzi's Image Encryption Schemementioning
confidence: 99%
See 3 more Smart Citations