2020
DOI: 10.3390/e23010057
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System

Abstract: Image encryption is an excellent method for the protection of image content. Most authors used the permutation-substitution model to encrypt/decrypt the image. Chaos-based image encryption methods are used in this model to shuffle the rows/columns and change the pixel values. In parallel, authors proposed permutation using non-chaotic methods and have displayed good results in comparison to chaos-based methods. In the current article, a new image encryption algorithm is designed using combination of Newton-Rap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 39 publications
(54 reference statements)
0
3
0
Order By: Relevance
“…Subsequently, numerical simulation methods such as MATLAB were employed to conduct in-depth analyses of the dynamic characteristics of hyperchaotic systems, including Lyapunov exponents' spectrum and bifurcation diagrams. Hyperchaotic systems hold vast potential for applications in fields like image encryption and communication security [58][59][60][61][62][63][64][65][66][67][68][69] , given their nonlinear characteristics and high security, thereby offering a promising avenue for research in information security and cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…Subsequently, numerical simulation methods such as MATLAB were employed to conduct in-depth analyses of the dynamic characteristics of hyperchaotic systems, including Lyapunov exponents' spectrum and bifurcation diagrams. Hyperchaotic systems hold vast potential for applications in fields like image encryption and communication security [58][59][60][61][62][63][64][65][66][67][68][69] , given their nonlinear characteristics and high security, thereby offering a promising avenue for research in information security and cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…Article [ 12 ] explains that, to encrypt/decrypt images, most researchers are using chaotic systems, whereas others prefer non-chaotic methods. In [ 12 ], a new encryption algorithm is proposed, which combines a non-chaotic Newton-Raphson’s method with a hyperchaotic two-dimensional map of a general Bischi-Naimzadah duopoly system.…”
mentioning
confidence: 99%
“…Article [ 12 ] explains that, to encrypt/decrypt images, most researchers are using chaotic systems, whereas others prefer non-chaotic methods. In [ 12 ], a new encryption algorithm is proposed, which combines a non-chaotic Newton-Raphson’s method with a hyperchaotic two-dimensional map of a general Bischi-Naimzadah duopoly system. The multiple security experiments made for measuring the efficiency of the method (among which we find entropy analysis) show that the proposed algorithm possesses a good security efficiency.…”
mentioning
confidence: 99%