2020
DOI: 10.1007/s11042-020-09880-9
|View full text |Cite
|
Sign up to set email alerts
|

IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 37 publications
(14 citation statements)
references
References 65 publications
0
14
0
Order By: Relevance
“…The watermark invisibility of the watermarked image Fig. 7 is calculated in Table 1 to evaluate the algorithm performance using PSNR-peak signal to noise ratio on a color image of size 256 × 256 with quantization step ranges from [0.1 To 1], increasing the quantization step leads to decreasing the average PSNR [29]. SSIM-structural similarity image index is also calculated to measure the watermarked image quality and similarity [12,37].…”
Section: Watermark Invisibilitymentioning
confidence: 99%
“…The watermark invisibility of the watermarked image Fig. 7 is calculated in Table 1 to evaluate the algorithm performance using PSNR-peak signal to noise ratio on a color image of size 256 × 256 with quantization step ranges from [0.1 To 1], increasing the quantization step leads to decreasing the average PSNR [29]. SSIM-structural similarity image index is also calculated to measure the watermarked image quality and similarity [12,37].…”
Section: Watermark Invisibilitymentioning
confidence: 99%
“…In 2D CA, the next state automata cells value relies upon every one of its neighbor's cells value around it in 2-D lattice. The significance of the 2D CA is evident from its usage in vast applications which include pattern testing, encryption methods design, image processing, bioinformatics, compression, intrusion detection systems, etc., [30]. The two-dimensional CA that includes an entire framework of cells with the information bit of every cell being refreshed by a rule that relies upon its neighbors in each of the four heading as shown in Figure 2.…”
Section: Table 1 Generation Of Rule For 1-d Camentioning
confidence: 99%
“…It examines the strength of the encryption scheme to determine how much it can break the relationship of neighboring pixels [40]. In the plain image, the adjacent pixels are highly correlated.…”
Section: Correlation Analysismentioning
confidence: 99%