2021
DOI: 10.1007/s11042-021-10549-0
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption algorithm based on dynamic DNA coding operations and 3D chaotic systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(11 citation statements)
references
References 52 publications
0
10
0
Order By: Relevance
“…Compared with the correlation coefficient of the medical image in Table 14 , the correlation coefficient of the encrypted image obtained by this algorithm is slightly lower than the [ 47 , 48 ], and slightly higher than the [ 49 ]. Compared with the correlation coefficient of ordinary images in Table 15 , the correlation coefficient of the encrypted image obtained by this algorithm is slightly lower than that of [ 1 ], and slightly higher than that of [ 33 , 54 ]. It shows that the algorithm can effectively reduce the correlation between adjacent pixels.…”
Section: Simulation Results and Security Analysismentioning
confidence: 79%
See 1 more Smart Citation
“…Compared with the correlation coefficient of the medical image in Table 14 , the correlation coefficient of the encrypted image obtained by this algorithm is slightly lower than the [ 47 , 48 ], and slightly higher than the [ 49 ]. Compared with the correlation coefficient of ordinary images in Table 15 , the correlation coefficient of the encrypted image obtained by this algorithm is slightly lower than that of [ 1 ], and slightly higher than that of [ 33 , 54 ]. It shows that the algorithm can effectively reduce the correlation between adjacent pixels.…”
Section: Simulation Results and Security Analysismentioning
confidence: 79%
“…In recent years, with the rapid development of the Internet, the rapid expansion of information, a large amount of information is transmitted in public channels, and the issue of information security is followed by [ 1 3 ]. There are many kinds of information data, such as text, language, pictures, videos, etc., among which pictures are the most widely used in information transmission [ 4 ].…”
Section: Introductionmentioning
confidence: 99%
“…Apart from 1D chaotic systems, a 3D chaotic system has also been used with DNA coding in [23]. The presented encryption scheme utilizes all 24 rules of DNA coding with 16 joint operations that make this scheme resistant to several attacks and an excellent scheme for securing digital images.…”
Section: Related Workmentioning
confidence: 99%
“…A linear congruence generator constructed from the table is for example The construction of the S-Boxes [19][20] requires the computation of some permutations in (𝑮 𝑡 ). the construction of such permutations will be defined by the following method:…”
Section: The Third Line Will Contain the Values Of The Parameter (𝑏 =...mentioning
confidence: 99%