2016
DOI: 10.1016/j.ijleo.2015.11.221
|View full text |Cite
|
Sign up to set email alerts
|

An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 65 publications
(12 citation statements)
references
References 19 publications
0
11
0
Order By: Relevance
“…For a comprehensive comparison, we use the logistic chaotic sequence under the same parameter to act on the operation of the DNA sequence. Additionally, histogram, information entropy [ 49 ], rate of base distribution, hamming distance [ 50 ], fixed point ratio [ 51 ], histogram variance [ 52 ], correlation coefficient, and the number of pixel change rate (NPCR) and unified average changing intensity (UACI) are used as the evaluation indexes. The relevant theories of these evaluation indexes are given by the following Eqs ( 3 )–( 16 ).…”
Section: Theoretical Basis Of This Studymentioning
confidence: 99%
“…For a comprehensive comparison, we use the logistic chaotic sequence under the same parameter to act on the operation of the DNA sequence. Additionally, histogram, information entropy [ 49 ], rate of base distribution, hamming distance [ 50 ], fixed point ratio [ 51 ], histogram variance [ 52 ], correlation coefficient, and the number of pixel change rate (NPCR) and unified average changing intensity (UACI) are used as the evaluation indexes. The relevant theories of these evaluation indexes are given by the following Eqs ( 3 )–( 16 ).…”
Section: Theoretical Basis Of This Studymentioning
confidence: 99%
“…We can know that the voice signal is completely covered by the chaotic signal, and the original shape could not be seen at all after the voice signal and the chaotic signal generated by the driving system is superimposed. The cracker could not get any information of the voice signal from the channel [29][30]. It has proved that the switching encryption method has pretty good privacy.…”
Section: Description Of Encryption and Decryption Algorithmmentioning
confidence: 99%
“…The final key space is .2 10 4 10 15 / 20 10 386 . In [24] and [25], the key space is 10 194 and 10 182 , respectively. Hence,the key space of our encryption algorithm is larger enough against brute-force attacks.…”
Section: Application To Image Encryptionmentioning
confidence: 99%
“…Hence,the key space of our encryption algorithm is larger enough against brute-force attacks. So the secret key space of the algorithm are 2 24 , which is larger than the one of [24] and [25]. Moreover, the adaptive controllers and parameter update laws are some functions with other variables and parameters, which must be known to decrypt.…”
Section: Application To Image Encryptionmentioning
confidence: 99%