2021
DOI: 10.1109/access.2021.3069591
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Substitution and Confusion-Diffusion-Based Noise-Resistive Image Encryption Using Multiple Chaotic Maps

Abstract: The advancement in wireless communication has encouraged the process of data transferring through the Internet. The process of data sharing via the Internet is prone to several attacks. The sensitive information can be protected from hackers with the help of a process called Encryption. Owing to the increase in cyberattacks, encryption has become a vital component of modern-day communication. In this article, an image encryption algorithm is suggested using dynamic substitution and chaotic systems. The suggest… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 38 publications
(23 citation statements)
references
References 65 publications
0
23
0
Order By: Relevance
“…If a small change in input causes 50% or greater change in output then the cryptosystem satisfies strict avalanche criteria [40], [41].…”
Section: ) Avalanche Effectmentioning
confidence: 99%
“…If a small change in input causes 50% or greater change in output then the cryptosystem satisfies strict avalanche criteria [40], [41].…”
Section: ) Avalanche Effectmentioning
confidence: 99%
“…For image encryption, chaos-based S-boxes include those generated from the chaotic sine map [139] and the logistic map [140]. Wang and Zhang [141] also proposed an algorithm with multiple S-box substitutions, where the order of the boxes is determined by a random chaos sequence.…”
Section: • Confusionmentioning
confidence: 99%
“…Scholars have suggested selective encryption techniques to reduce correlation and redundancy [37,38]. For instance, some approaches encrypt critical compression coefficients [39] and others encrypt the interleaved patient information included in images [40], while others encrypt only the important bits of particular coefficients using a stream cipher [41][42][43][44]. However, such security techniques have several vulnerabilities, such as high computational time and weak security, which may also result in data loss and some false negative diagnoses [45][46][47].…”
Section: Related Workmentioning
confidence: 99%