2019
DOI: 10.1007/s00521-019-04637-4
|View full text |Cite
|
Sign up to set email alerts
|

Hopfield attractor-trusted neural network: an attack-resistant image encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
25
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 61 publications
(27 citation statements)
references
References 27 publications
1
25
0
Order By: Relevance
“…And compared with Ref. [34], [35], [36] in Table V, our algorithm has better information entropy, which means that the encrypted image is very messy and it is difficult for an attacker to obtain useful information from it. Therefore, encrypted image has good security.…”
Section: F Information Entropymentioning
confidence: 98%
“…And compared with Ref. [34], [35], [36] in Table V, our algorithm has better information entropy, which means that the encrypted image is very messy and it is difficult for an attacker to obtain useful information from it. Therefore, encrypted image has good security.…”
Section: F Information Entropymentioning
confidence: 98%
“…New researches are developed to propose modern encryption algorithms. A chaotic system is a major tool in this prominent research domain due to ergodicity, deterministic dynamics, unpredictable behaviors, nonlinear transformation, and sensitivity dependence of the system [ 49 52 ]. For instance, Gao et al [ 49 ] designed an encryption algorithm based on Chen hyperchaotic system.…”
Section: Introductionmentioning
confidence: 99%
“…Experimental results show a high security algorithm. Lakshmi et al [ 52 ] design an encryption algorithm based on HNN. The technics uses a simple diffusion–confusion algorithm, and security against some existing attacks is achieved.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A lot of researches have been done on one-dimensional chaotic map, like Logistic chaotic map, Tent chaotic map, two-dimensional chaotic map, like Cat chaotic map, three-dimensional chaotic map, like Lorenz chaotic map, and spatiotemporal chaotic system, like Logistic-Dynamics Coupled Map Lattices (LDCML) spatiotemporal chaotic system [10], all indicate that cryptography based on chaos theory has become a popular research direction for researchers [11][12][13][14]. With the deepening of scholars' research, many chaotic systems and image encryption algorithms based on chaos theory have been proposed and achieved good results [15][16][17][18][19][20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%