2022
DOI: 10.1007/s11071-022-07949-8
|View full text |Cite
|
Sign up to set email alerts
|

Design of cross-plane colour image encryption based on a new 2D chaotic map and combination of ECIES framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 50 publications
0
2
0
Order By: Relevance
“…However, although the DNA coding technique contributed to improving the security of encryption, the extra time of coding and decoding limited its application in real-time communications. Li et al [45] accelerated their algorithm by achieving cross-plane scrambling and diffusion at the row level; however, diffusion in only one direction could not guarantee sufficient security against chosen-plaintext attacks. Zhang et al [46] converted a color image into a 2D matrix and then applied a multithread technique to reduce the time consumption of scrambling; however, the diffusion process was still traditional and inefficient.…”
Section: Introductionmentioning
confidence: 99%
“…However, although the DNA coding technique contributed to improving the security of encryption, the extra time of coding and decoding limited its application in real-time communications. Li et al [45] accelerated their algorithm by achieving cross-plane scrambling and diffusion at the row level; however, diffusion in only one direction could not guarantee sufficient security against chosen-plaintext attacks. Zhang et al [46] converted a color image into a 2D matrix and then applied a multithread technique to reduce the time consumption of scrambling; however, the diffusion process was still traditional and inefficient.…”
Section: Introductionmentioning
confidence: 99%
“…Image compression can effectively solve this problem, reduce storage space, and save transmission bandwidth [16] adds compressed sensing technology on this basis, compresses and encrypts the plaintext image into a cipher image, and then embeds it into the carrier image to obtain a visually safe image of the same size. In these studies [43][44][45][46], there are still some shortcomings:…”
Section: Introductionmentioning
confidence: 99%
“…Various methods have been proposed, including symmetric and asymmetric encryption [1,2], steganography, and watermarking [3]. Chaos-based encryption has received much attention among these methods due to its random and unpredictable nature [4][5].…”
Section: Introductionmentioning
confidence: 99%