2013 International Conference on Communication Systems and Network Technologies 2013
DOI: 10.1109/csnt.2013.105
|View full text |Cite
|
Sign up to set email alerts
|

An Encryption and Decryption Algorithm for Image Based on DNA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 10 publications
0
9
0
Order By: Relevance
“…However, when applying DNA in image encryption, due to the fixed number of DNA combinations, the rules of DNA encoding are limited. Therefore, considering the advantages of the chaos theory, image encryption algorithms, combining DNA algorithm with digital chaos, are proposed in spatial-domain [6][7][8][9][10][11][12][13]. Besides, DNA encryption is also introduced into colour images [14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…However, when applying DNA in image encryption, due to the fixed number of DNA combinations, the rules of DNA encoding are limited. Therefore, considering the advantages of the chaos theory, image encryption algorithms, combining DNA algorithm with digital chaos, are proposed in spatial-domain [6][7][8][9][10][11][12][13]. Besides, DNA encryption is also introduced into colour images [14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…Step 2: Encode the matrixes RA, RB, RC, RD into DNA sequence matrices EA, EB, EC, ED individually according to the encoding schemes of DNA sequence rule (1), rule (7), rule (13) and rule (19);…”
Section: Details Of the Encryption Processmentioning
confidence: 99%
“…Jain et al presented adaptive key length based encryption algorithm using DNA approach [18]. Soni et al proposed an encryption and decryption algorithm for image based on DNA [19]. Zhou et al pointed out image encryption algorithm based on DNA sequences for the big image [20].…”
Section: Introductionmentioning
confidence: 99%
“…In current modern age, number of networks such as LAN, WAN, WLAN, PAN, MAN and others are designed and employed to shared the information by the mean of computers and other electronic devices [1], [2] The information exchanging is a most important part of human daily life, number of electronic devices such as laptops, desktops, tablets, mobile devices and other are employed in sharing or/and in exchanging of information and the information is may in the forms of text, images, audio/video and other multimedia formats. With the revolution of internet technology, the daily information exchange is more easily and required few seconds to transmitted the information from one part of world to other part of the world; but there have been number of security issues are accounted that interrupting the information in transmission [2][3][4][5]. As a result, information does not deliverable to the destination.…”
Section: Introductionmentioning
confidence: 99%