2018
DOI: 10.1016/j.sigpro.2017.08.018
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
12
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(12 citation statements)
references
References 24 publications
0
12
0
Order By: Relevance
“…The traditional method is difficult to solve these problems, so the intelligent algorithms are required to solve these problems. Inspired by nature, these strong metaheuristic algorithms are applied to solve NP-hard problems such as scheduling [3][4][5][6][7], image [8][9][10], feature selection [11][12][13] and detection [14][15][16], path planning [17,18], cyber-physical social system [19,20], texture discrimination [21], factor evaluation [22], saliency detection [23], classification [24,25], object extraction [26], gesture segmentation [27], economic load dispatch [28,29], shape design [30], big data and large-scale optimization [31][32][33], signal processing [34], silencing efficacy prediction [35], multi-objective optimization [36,37], unit commitment [38,39], vehicle routing [40], knapsack problem [41][42][43] and fault diagnosis [44][45][46], and test-sheet composition…”
Section: Introductionmentioning
confidence: 99%
“…The traditional method is difficult to solve these problems, so the intelligent algorithms are required to solve these problems. Inspired by nature, these strong metaheuristic algorithms are applied to solve NP-hard problems such as scheduling [3][4][5][6][7], image [8][9][10], feature selection [11][12][13] and detection [14][15][16], path planning [17,18], cyber-physical social system [19,20], texture discrimination [21], factor evaluation [22], saliency detection [23], classification [24,25], object extraction [26], gesture segmentation [27], economic load dispatch [28,29], shape design [30], big data and large-scale optimization [31][32][33], signal processing [34], silencing efficacy prediction [35], multi-objective optimization [36,37], unit commitment [38,39], vehicle routing [40], knapsack problem [41][42][43] and fault diagnosis [44][45][46], and test-sheet composition…”
Section: Introductionmentioning
confidence: 99%
“…Optimization problems have been one of the most important research topics in recent years. They exist in many domains, such as scheduling [1,2], image processing [3][4][5][6], feature selection [7][8][9] and detection [10], path planning [11,12], feature selection [13], cyber-physical social system [14,15], texture discrimination [16], saliency detection [17], classification [18,19], object extraction [20], shape design [21], big data and large-scale optimization [22,23], multi-objective optimization [24], knapsack problem [25][26][27], fault diagnosis [28][29][30], and test-sheet composition [31]. Metaheuristic algorithms [32], a theoretical tool, are based on nature-inspired ideas, which have been extensively used to solve highly non-linear complex multi-objective optimization problems [33][34][35].…”
Section: Introductionmentioning
confidence: 99%
“…DMQL-CS Algorithm. Input: Population size, NP; Maximum number of function evaluations, MAX_FES, LP (1) Randomly initialize position of NP nest, FES = NP;(2) Calculate the fitness value of each initial solution;(3) while (stopping criterion is not meet do)(4) Select the best step size control strategy according to Algorithm 2;(5) Generate new solution x t+1 i with the new step size by Lévy flights;(6) …”
mentioning
confidence: 99%
“…Wang et al [62] crypt-analyzed the Chanil Pak scheme [23] using a chosen plaintext attack [63]. H. Fan et al [64] exploited the weakness in the encryption scheme proposed by H. I. Hsiao [25] using the chosen-plaintext attack while R. Rhouma et al [65] break the cipher presented by V. Patidar [58] using the same technique to recover the original image without knowing the secret key. Similarly, X. Zhang [66] cryptanalyzed the Y. Liu [59] designed technique using a chosen plaintext attack.…”
Section: Introductionmentioning
confidence: 99%