2020
DOI: 10.1007/s11082-020-2219-8
|View full text |Cite
|
Sign up to set email alerts
|

Double image encryption using 3D Lorenz chaotic system, 2D non-separable linear canonical transform and QR decomposition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(19 citation statements)
references
References 62 publications
0
12
1
Order By: Relevance
“…Figure 4(a) 7.3671 Table 6 shows the information entropies of the plain and encrypted images (Figure 4 Table 7 shows the comparison results between our information entropies and others' in the case of encrypting the same images. The values obtained by our method are closer to 8 than those from EI-Latif [11], Liu [12], Abd-EI-Atty [16], and Rakheja [19]. Although our result is not better than that of Liu [20], the results differ by only 0.0001.…”
Section: E Information Entropy Analysiscontrasting
confidence: 45%
See 2 more Smart Citations
“…Figure 4(a) 7.3671 Table 6 shows the information entropies of the plain and encrypted images (Figure 4 Table 7 shows the comparison results between our information entropies and others' in the case of encrypting the same images. The values obtained by our method are closer to 8 than those from EI-Latif [11], Liu [12], Abd-EI-Atty [16], and Rakheja [19]. Although our result is not better than that of Liu [20], the results differ by only 0.0001.…”
Section: E Information Entropy Analysiscontrasting
confidence: 45%
“…Almost all of these methods are designed for traditional digital images, while the encryption of quantum images remains in its infancy. However, as the traditional computer approaches its physical limits, researchers are beginning to study a new computing model, and quantum computers have produced a series of satisfactory encryption results [11][12][13][14][15][16][17][18][19][20][21][22][23][24]. For example, EI-Latif [11] presented an encryption algorithm of quantum medical images.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared with 2D medical images, 3D medical volume data contains more information than the former [27]. Traditional encryption methods, such as DES and RSA, have the disadvantages of complex structure, single key and slow encryption speed, which make it difficult to meet the encryption requirements of medical body data with such a large amount of data [28]. In view of the limitations of traditional image encryption and low-dimensional chaotic encryption, this paper proposes an improved perceptive hash method to encrypt watermark information by using Lorenz system to generate hyperchaotic sequence for 3D displacement.…”
Section: Related Work a Lorenz 3d Hyperchaosmentioning
confidence: 99%
“…However, medical images are different from traditional images. In order to ensure the accuracy of diagnosis, doctors usually embed the patient's name, gender, age and other personal privacy information into the medical images, and these images are an important source for doctors to obtain and diagnose the patient's physical disease information [1]- [3], [28]. In the medical field, the quality of medical data used for diagnosis is very strict and no changes to the original data are allowed.…”
Section: Introductionmentioning
confidence: 99%