2020
DOI: 10.1007/s11042-020-09279-6
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of traditional and modern image encryption algorithms under realistic ambience

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Key size is a crucial parameter utilized for testing cryptography systems. Keyspace specifies the total combinations of keys 26 . Keys with a longer length offer higher resistance, and it has a significant impact on an encryption model's robustness against attack 20 .…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Key size is a crucial parameter utilized for testing cryptography systems. Keyspace specifies the total combinations of keys 26 . Keys with a longer length offer higher resistance, and it has a significant impact on an encryption model's robustness against attack 20 .…”
Section: Resultsmentioning
confidence: 99%
“…The occurrence of this noise is due to sharp and sudden annoyance in images. It appears as a collection of dark and white pixels throughout the image 26 …”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Vigenère cypher is an algorithm designed for a long time and is included in the class of classic algorithms because it operates on a character scale instead of bits and a simple encryption and decryption calculation process [1] [2]. Nevertheless, the vigenère cypher can be categorized as a modern cryptographic algorithm if the encryption and decryption process is carried out using the XOR technique to operate on a bit scale [3] [4]. Although simple, this algorithm is quite safe, and because of its simplicity, the Vigenère cypher algorithm is an algorithm that is very light in terms of algorithm complexity, so this algorithm only requires a small number of computer resources and time for the encryption and decryption process [5].…”
Section: Introductionmentioning
confidence: 99%