2021
DOI: 10.1016/j.optlaseng.2020.106346
|View full text |Cite
|
Sign up to set email alerts
|

A novel image encryption method based on fractional discrete Meixner moments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 41 publications
0
14
0
Order By: Relevance
“…In image encryption, a higher information entropy indicates a more uniform distribution of pixel values in an image, and the more difficult it is for an attacker to crack it. An effective encryption scheme (El ogri, Karmouni, et al 2021) has an entropy value close to 8, and a poor encryption process has an entropy value close to 0. Ciphertext images with entropy values close to 8 indicate better performance of the encryption algorithm.…”
Section: Entropy Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In image encryption, a higher information entropy indicates a more uniform distribution of pixel values in an image, and the more difficult it is for an attacker to crack it. An effective encryption scheme (El ogri, Karmouni, et al 2021) has an entropy value close to 8, and a poor encryption process has an entropy value close to 0. Ciphertext images with entropy values close to 8 indicate better performance of the encryption algorithm.…”
Section: Entropy Analysismentioning
confidence: 99%
“…Liu et al designed an encryption technology in gyrator transform domains (Chen, Zhu, et al 2015). In addition, some optical image encryption methods (Liu, Guo, et al 2015;Liu, Chen, et al 2018;Gong, Wang et al 2019;Liansheng, Xiao, et al 2019;El ogri, Karmouni, et al 2021;Su, Xu, et al 2021;Sui, Pang, et al 2021;Wang, Wang, et al 2021;Duan, Zhou, et al 2022) based on eFrFT, jigsaw transform, digital holography, computational holography, phase recovery algorithms, ghost imaging, diffraction imaging, and interference have been proposed. Here optical transforms and methods for generating random data are combined to design encryption methods.…”
Section: Introductionmentioning
confidence: 99%
“…Some mathematical operations are applied on the secret key to choose it as the initial conditions of the Logistic maps. [14] proposed an image encryption and decryption scheme based on jigsaw transform and fractional discrete Meixner moments. The bit planes are extracted from the plain image.…”
Section: Introductionmentioning
confidence: 99%
“…The shortcoming in [14] scheme is jigsaw transform which is a weak against the different attacks. Moreover, other methods depending on simple logistic map such as [15] and [18] cannot assure high-security level.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation