2019
DOI: 10.1007/s12652-019-01580-z
|View full text |Cite
|
Sign up to set email alerts
|

Differential evolution optimization of intertwining logistic map-DNA based image encryption technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
23
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 41 publications
(26 citation statements)
references
References 52 publications
0
23
0
Order By: Relevance
“…Researchers have combined chaotic maps with various techniques such as cellular automata, optimization methods and DNA encoding to propose secure and efficient image encryption techniques. Two of such methods have been proposed in [20,21]. The authors in [21], combined Differential optimization with ILM to propose a faster and secure method, and the authors in [20] used cosine-based transformation to overcome limitation of one-dimensional chaos maps.…”
Section: Comparison With Existing Approachesmentioning
confidence: 99%
See 4 more Smart Citations
“…Researchers have combined chaotic maps with various techniques such as cellular automata, optimization methods and DNA encoding to propose secure and efficient image encryption techniques. Two of such methods have been proposed in [20,21]. The authors in [21], combined Differential optimization with ILM to propose a faster and secure method, and the authors in [20] used cosine-based transformation to overcome limitation of one-dimensional chaos maps.…”
Section: Comparison With Existing Approachesmentioning
confidence: 99%
“…Two of such methods have been proposed in [20,21]. The authors in [21], combined Differential optimization with ILM to propose a faster and secure method, and the authors in [20] used cosine-based transformation to overcome limitation of one-dimensional chaos maps. Motivated by these works, the method proposed in this paper combines ILM and cosine transformation to achieve target of secure and efficient image encryption.…”
Section: Comparison With Existing Approachesmentioning
confidence: 99%
See 3 more Smart Citations