2020
DOI: 10.1016/j.ijleo.2019.163505
|View full text |Cite
|
Sign up to set email alerts
|

Binary search tree image encryption with DNA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
47
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 55 publications
(52 citation statements)
references
References 25 publications
1
47
0
Order By: Relevance
“…Compared with the Ref. [11], [33], [34], [38], the information entropy of the encrypted image in this paper is greater, indicating that it can effectively resist statistical attacks. When calculating information entropy, whether to discard pixels with probability 0 has no effect on ordinary grayscale images.…”
Section: E Information Entropymentioning
confidence: 82%
See 4 more Smart Citations
“…Compared with the Ref. [11], [33], [34], [38], the information entropy of the encrypted image in this paper is greater, indicating that it can effectively resist statistical attacks. When calculating information entropy, whether to discard pixels with probability 0 has no effect on ordinary grayscale images.…”
Section: E Information Entropymentioning
confidence: 82%
“…We can see that compared with the Ref. [33], [37], [39], our encrypted image generally has more ideal NPCR and UACI, which shows that the algorithm has good resistance to differential attack.…”
Section: G Differential Attack Analysismentioning
confidence: 84%
See 3 more Smart Citations