2015
DOI: 10.1007/s00521-015-2028-3
|View full text |Cite
|
Sign up to set email alerts
|

Encryption function on artificial neural network

Abstract: Six algorithms that design secrecy keys are used for digital image encryption. The privacy keys generated by stream cipher generators were tested for their randomness applying five tests of randomness. The images generated by applying each algorithm were tested for their regularity and residual intelligibility. The histograms for images ciphered by stream cipher schemes all have approximately flat histogram less information as compared to one-dimensional ciphering algorithms and threshold generator-based image… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…An encoding and decryption model based on the chaotic scheme and the artificial neural network with an encryption and decryption algorithm to raise the level of confidentiality was also presented, but this study considered neural networks as a supportive part rather than an essential part in the encryption and decryption process (Al-Abaidy, 2020). Another study tried to employ neural networks to perform the encryption task, but it was weak, and the use of neural networks was limited to the generation of encryption keys and the field of generating the keys; it did not present a clear method of using neural networks to perform encryption and decryption in their total form (Al Azawee, et al, 2015). Chaotic technology was also used to improve neural networks to perform encryption and decryption and proposed what is called chaotic neural networks (CNN), but it was of great complexity and included three stages: the stage of generation of the chaotic key and education, the stage of generation of the chaotic chain, and the encryption process.…”
Section: Introductionmentioning
confidence: 99%
“…An encoding and decryption model based on the chaotic scheme and the artificial neural network with an encryption and decryption algorithm to raise the level of confidentiality was also presented, but this study considered neural networks as a supportive part rather than an essential part in the encryption and decryption process (Al-Abaidy, 2020). Another study tried to employ neural networks to perform the encryption task, but it was weak, and the use of neural networks was limited to the generation of encryption keys and the field of generating the keys; it did not present a clear method of using neural networks to perform encryption and decryption in their total form (Al Azawee, et al, 2015). Chaotic technology was also used to improve neural networks to perform encryption and decryption and proposed what is called chaotic neural networks (CNN), but it was of great complexity and included three stages: the stage of generation of the chaotic key and education, the stage of generation of the chaotic chain, and the encryption process.…”
Section: Introductionmentioning
confidence: 99%