2020
DOI: 10.1109/access.2020.3020917
|View full text |Cite
|
Sign up to set email alerts
|

DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption

Abstract: Visual selective image encryption can both improve the efficiency of the image encryption algorithm and reduce the frequency and severity of attacks against data. In this article, a new form of encryption is proposed based on keys derived from Deoxyribonucleic Acid (DNA) and plaintext image. The proposed scheme results in chaotic visual selective encryption of image data. In order to make and ensure that this new scheme is robust and secure against various kinds of attacks, the initial conditions of the chaoti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
42
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 72 publications
(44 citation statements)
references
References 46 publications
(44 reference statements)
0
42
0
Order By: Relevance
“…For example, it can be used instead of the s-box structures in Ref. [61], as well as in successful image encoding algorithms in the literature [62,63].…”
Section: A Practical Application Of Generated Random Bit Sequencesmentioning
confidence: 99%
“…For example, it can be used instead of the s-box structures in Ref. [61], as well as in successful image encoding algorithms in the literature [62,63].…”
Section: A Practical Application Of Generated Random Bit Sequencesmentioning
confidence: 99%
“…For a successful encryption scheme, the key space should be wide enough to withstand a brute force attack. It must [12] 99.607% 33.427 [11] 99.630% 33.400 [24] 90.955 % 30.433 [22] 99.655% 33.467 be more than or same to 2 100 . In the BPCM algorithm, the key space has three parts: the initial value and the parameter of the Tent chaotic map, the coefficients of continuous polynomial functions of variate degree n > 0, and the interval boundaries.…”
Section: ) Key Sensitivity Analysismentioning
confidence: 99%
“…[23] used a 3D chaotic logistic map with DNA encoding to suggest an image encryption approach. A new form of encryption was proposed by [24] based on keys derived from DNA and plaintext image. In this paper, the proposed encryption algorithm is based on 1D chaotic Tent map to change pixel values of image because it is simple to implement than other high-dimensional chaotic maps and of course it ıs achieved by the general useful properties of chaotic maps.…”
Section: Introductionmentioning
confidence: 99%
“…In the absence of compression stage, the resolution of the meaningful cipher image is four times that of the plain image, which increases the unnecessary cost of storage and transmission. Later, many improved visually meaningful image encryption algorithms [30][31][32][33][34] have been proposed one after another. Such as Ref.…”
Section: Introductionmentioning
confidence: 99%
“…The existing embedding methods, such as LSB [31], SVD [19,33], IWT [29,30], RCT [50], DCT [53] and so on, cannot protect the hidden ciphertext.…”
mentioning
confidence: 99%