2021
DOI: 10.1007/s00034-021-01665-1
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic Jerk System with Hump Structure for Text and Image Encryption Using DNA Coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(9 citation statements)
references
References 75 publications
0
8
0
Order By: Relevance
“…( 1) is replaced by a logistic map in Eq. (10). Its new mathematical mapping equation can be defined as…”
Section: Enhanced Logistic Mapmentioning
confidence: 99%
See 1 more Smart Citation
“…( 1) is replaced by a logistic map in Eq. (10). Its new mathematical mapping equation can be defined as…”
Section: Enhanced Logistic Mapmentioning
confidence: 99%
“…[3] Those characteristics, such as initial state sensitivity, unpredictability, fractal dimension, and ergodicity, push chaotic systems to be widely studied and applied in many scenarios, such as personal information security, [4] communication systems, [5] and power systems. [6] Presently, many chaotic systems have been developed for various applications, such as chaotic synchronization, [7,8] chaotic secure communication, [9] chaotic cryptography, [10,11] and chaotic neural networks. [12,13] Among them, chaotic secure communication and chaotic encryption [14,15] are among the hottest topics in the research of international electronic communications.…”
Section: Introductionmentioning
confidence: 99%
“…For both text and image encryption, Signing et al [ 41 ] suggested a cryptosystem based on the unique randomness created by a chaotic Jerk system with DNA coding and a hump structure. Before diving deeper into the phenomenon and putting the encryption method into practice, it is helpful to do some preliminary research on the dynamic features of a Jerk system and DNA coding.…”
Section: Introductionmentioning
confidence: 99%
“…The confusion step uses block scrambling and modified zigzag transformation and the Diffusion step uses 3D logistic map and key generation followed by the additive cipher. In [29] Folifack et al studied the dynamic properties of a Jerk system as well as DNA coding with the purpose of the implementation of an encryption technique.…”
Section: Introductionmentioning
confidence: 99%