2017
DOI: 10.1117/1.oe.56.11.116117
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic image encryption scheme using two-by-two deoxyribonucleic acid complementary rules

Abstract: Shuliang Sun, "Chaotic image encryption scheme using two-by-two deoxyribonucleic acid complementary rules," Opt. Eng. 56(11), 116117 (2017), doi: 10.1117/1.OE.56.11.116117. Abstract. An image encryption technique has been proposed using deoxyribonucleic acid (DNA) operations and chaotic map in this scheme. First, initial conditions of row encryption and column encryption are calculated. Then, a two-dimensional sine iterative chaotic map with infinite collapse (ICMIC) modulation map (2D-SIMM) is adopted to prod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 22 publications
(25 reference statements)
0
15
0
Order By: Relevance
“…is indicates that the proposed encryption scheme is secure against an entropy attack. In addition, Table 7 presents an average entropy analysis for the five images for the proposed method and the other reference methods from [36,37,43,51].…”
Section: Entropy Informationmentioning
confidence: 99%
See 2 more Smart Citations
“…is indicates that the proposed encryption scheme is secure against an entropy attack. In addition, Table 7 presents an average entropy analysis for the five images for the proposed method and the other reference methods from [36,37,43,51].…”
Section: Entropy Informationmentioning
confidence: 99%
“…us, the proposed algorithm could detect minuscule alterations to the plaintext and was able to repel a differential attack. e proposed method was also compared with reference methods [36,37,43,51] for the encrypted Lena image, as presented in Table 9. e NPCR and UACI values for the proposed method are superior, as they are higher than the values obtained using the reference methods.…”
Section: Differential Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…It is suitable for image encryption. Many chaotic image cryptosystems have been proposed [4][5][6][7][8][9]. Gao et al [4] proposed a new nonlinear chaotic algorithm based on a power function and tangent function.…”
Section: Introductionmentioning
confidence: 99%
“…An expanded XOR operation was also employed for the red (R), green (G) and blue (B) components of color images. Sun [ 6 ] proposed an image encryption scheme based on DNA operations and a chaotic map. A two-dimensional sine iterative chaotic map with an infinite collapse matrix was employed.…”
Section: Introductionmentioning
confidence: 99%