2020
DOI: 10.1016/j.optlastec.2020.106465
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic evolutionary-based image encryption using RNA codons and amino acid truth table

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(17 citation statements)
references
References 23 publications
1
16
0
Order By: Relevance
“…In between there are alternating periodic states and chaotic states appearing. When n∈(0.13,0.2) and p∈ (2,25), the changes of Lyapunov exponent spectrum and bifurcation diagram are also consistent. It can be known that the dynamical characteristics of the fractional-order chaotic system is variegated so that the proposed chaotic system is suitable for cryptosystem [25,44,45].…”
Section: Chaotic Systemsupporting
confidence: 54%
See 3 more Smart Citations
“…In between there are alternating periodic states and chaotic states appearing. When n∈(0.13,0.2) and p∈ (2,25), the changes of Lyapunov exponent spectrum and bifurcation diagram are also consistent. It can be known that the dynamical characteristics of the fractional-order chaotic system is variegated so that the proposed chaotic system is suitable for cryptosystem [25,44,45].…”
Section: Chaotic Systemsupporting
confidence: 54%
“…From the Table 5, the results are closed to theoretical expectations and it will get an almost completely different image if the gray value of the image is changed slightly. Moreover, we list the average values of NPCR and UACI in other literature which is shown in Table 6 [6,2,51,9]. Results indicate that our algorithm can resist differential attack effectively.…”
Section: Differential Attackmentioning
confidence: 96%
See 2 more Smart Citations
“…In [ 33 ], Mahmud et al presented an image encryption method by combining RNA with Genetic Algorithm (GA) through using a logistic map. In [ 34 ], Abbasi et al employed Chen’s chaotic system to encrypt an image with imperialist competition algorithm and RNA operations. Yadollahi et al utilized the concepts of DNA and RNA to construct a two-phase image encryption method [ 35 ].…”
Section: Introductionmentioning
confidence: 99%