2019
DOI: 10.1007/s10916-019-1389-z
|View full text |Cite
|
Sign up to set email alerts
|

Fast and Secure Medical Image Encryption Based on Non Linear 4D Logistic Map and DNA Sequences (NL4DLM_DNA)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(19 citation statements)
references
References 27 publications
0
18
0
Order By: Relevance
“…[15] Use pseudo-random sequence generator and improved Logistic mapping to encrypt images. [16] Block image encryption using four-dimensional Logistic mapping and DNA sequence algorithm. [17] proposed a combination of baker map and Logistic map into a two-dimensional chaotic system, and used this algorithm to encrypt the image.…”
Section: Introductionmentioning
confidence: 99%
“…[15] Use pseudo-random sequence generator and improved Logistic mapping to encrypt images. [16] Block image encryption using four-dimensional Logistic mapping and DNA sequence algorithm. [17] proposed a combination of baker map and Logistic map into a two-dimensional chaotic system, and used this algorithm to encrypt the image.…”
Section: Introductionmentioning
confidence: 99%
“…The correlation data of the pixels adjacent to Lena's image in Table 3 after encryption in three directions are very small and this proves that the image is encrypted with a higher degree of confusion. 90 20.0020 20.0015 20.0012 Encryption Lena image in Elamrawy et al 91 0.0015 20.0037 0.0079 Encryption Lena image in Sun 92 0.0013 0.0021 20.0024 Encryption Lena image in Stalin et al 93 0.0052 0.0031 0.0019 Encrypted Lena image in this paper 0.0014 20.0016 20.0011…”
Section: Correlation Testmentioning
confidence: 81%
“…Data encryption is usually done by chaotic or hyper-chaotic methods [ 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 ]. In some researches, chaotic or hyper-chaotic systems are used to encrypt peripheral data [ 38 , 39 , 40 , 41 , 42 , 43 ].…”
Section: Introductionmentioning
confidence: 99%
“…In some researches, chaotic or hyper-chaotic systems are used to encrypt peripheral data [ 38 , 39 , 40 , 41 , 42 , 43 ]. In recent years, researchers have focused on the encryption of medical data using chaotic methods [ 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 ]. Medical data contains important information about patients [ 41 , 44 , 45 , 46 ].…”
Section: Introductionmentioning
confidence: 99%