2022
DOI: 10.1016/j.ins.2022.01.042
|View full text |Cite
|
Sign up to set email alerts
|

An image encryption algorithm based on new generalized fusion fractal structure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(21 citation statements)
references
References 42 publications
0
12
0
Order By: Relevance
“…For comparison, full image encryption and region of interest encryption were performed on medical images of size 512 × 512 and 320 × 320, respectively, with the encryption scheme proposed in this paper. The encryption scheme’s efficiency is determined by the encryption time (ET) and throughput (ETP) [ 54 ]. These computing statistics are expressed as follows: …”
Section: Simulation Results and Safety Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…For comparison, full image encryption and region of interest encryption were performed on medical images of size 512 × 512 and 320 × 320, respectively, with the encryption scheme proposed in this paper. The encryption scheme’s efficiency is determined by the encryption time (ET) and throughput (ETP) [ 54 ]. These computing statistics are expressed as follows: …”
Section: Simulation Results and Safety Analysismentioning
confidence: 99%
“…[36] 320 × 320 0.186 s 0.120 s 70 39,168 4.98 Ref. [54] 256 × 256 0.010 s ---50 Ref. [55] 512 × 512 0.287 s ---6.9 Ref.…”
Section: Speed Analysismentioning
confidence: 99%
“…In addition, Belazi and El-Latif [22] proposed a simple algorithm for constructing an S-box using sine chaotic maps. Furthermore, Musheer et al [43] proposed an algorithm to assemble an S-box using generalized fusion fractal structure. Elliptic curves (ECs) have recently gained reputable attention in cryptography and are being used to design strong cryptosystems.…”
Section: A Related Workmentioning
confidence: 99%
“…The encryption technology based on image secret segmentation and sharing completes image encryption through segmentation and merging [17]. Ahmad et al completed the storage, hiding, and transmission of shadow images through image segmentation and sharing [18]. Liang et al proposed a more economical and effective encryption processing method by studying image secret sharing technology [19].…”
Section: Literature Reviewmentioning
confidence: 99%