2023
DOI: 10.1109/tcsvt.2023.3237136
|View full text |Cite
|
Sign up to set email alerts
|

Asynchronous Updating Boolean Network Encryption Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(14 citation statements)
references
References 51 publications
0
7
0
Order By: Relevance
“…Traditional encryption algorithms used for remote sensing images suffer from weak security, susceptibility to attack, and low encryption efficiency. Many image encryption algorithms have been proposed to address these challenges, which can be based on such things as chaotic functions [2,3], DNA coding [4][5][6], meta-cellular automata [7,8], meta-heuristic techniques [9][10][11], S-boxes [12,13], asynchronous updating Boolean networks [14], and Fourier and wavelet transforms [15,16]. Zou et al [17] introduced ICCTML, an enhanced dynamic model that combines Tent chaotic systems and cross-coupled mappings, offering greater convenience, a wider chaotic range, and higher information entropy.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional encryption algorithms used for remote sensing images suffer from weak security, susceptibility to attack, and low encryption efficiency. Many image encryption algorithms have been proposed to address these challenges, which can be based on such things as chaotic functions [2,3], DNA coding [4][5][6], meta-cellular automata [7,8], meta-heuristic techniques [9][10][11], S-boxes [12,13], asynchronous updating Boolean networks [14], and Fourier and wavelet transforms [15,16]. Zou et al [17] introduced ICCTML, an enhanced dynamic model that combines Tent chaotic systems and cross-coupled mappings, offering greater convenience, a wider chaotic range, and higher information entropy.…”
Section: Introductionmentioning
confidence: 99%
“…Today, there are numerous methods for image protection [4][5][6], with image encryption being the most commonly used means to ensure confidentiality and integrity of digital images during transmission and storage. However, as computational capabilities continue to advance, traditional image encryption techniques are becoming more susceptible to attacks [7][8][9]. Therefore, there is an urgent need for new and more secure image encryption algorithms to ensure the security of digital image transmission [10][11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…Benefiting from the randomness caused by the complex dynamic behaviors of the chaotic system, various chaosbased encryption schemes are proposed [23][24][25][26]. Especially, the chaos-based image encryption schemes are studied deeply.…”
Section: Introductionmentioning
confidence: 99%