2018
DOI: 10.1109/jphot.2018.2827165
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption-Then-Transmission Using DNA Encryption Algorithm and The Double Chaos

Abstract: According to the DNA encryption algorithm and the double-chaotic system which contains the optical chaos and the coupled map lattice chaotic system, a novel image encryption-then-transmission system is proposed. In the system, with identical chaotic injection from a master laser with two optical feedbacks, two slave lasers (SL1 and SL2) can output similar chaotic signals served as chaotic carrier to transmit image and used to generate the core part of the encryption scheme. A 128-b key is selected to generate … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 65 publications
(41 citation statements)
references
References 37 publications
0
41
0
Order By: Relevance
“…Chaotic cryptography is an essential tool to develop fortified encryption schemes that improve the security analysis performance of cryptographic algorithms where the distinct chaotic assets such as the nature of determinism, random performance, nonlinear conversion, sensitivity to preliminary conditions, and structure parameters have approved "chaos" as an encouraging substitute for conventional and public key cryptographic algorithms. Since Matthews employed chaos into cryptology for the first time in 1989 [26], many chaotic systems have been employed in image encryption [27][28][29]. In 1963, Lorenz [30] discovered the three-dimensional (3D) independent chaotic system.…”
Section: Employed Chaotic Systemmentioning
confidence: 99%
“…Chaotic cryptography is an essential tool to develop fortified encryption schemes that improve the security analysis performance of cryptographic algorithms where the distinct chaotic assets such as the nature of determinism, random performance, nonlinear conversion, sensitivity to preliminary conditions, and structure parameters have approved "chaos" as an encouraging substitute for conventional and public key cryptographic algorithms. Since Matthews employed chaos into cryptology for the first time in 1989 [26], many chaotic systems have been employed in image encryption [27][28][29]. In 1963, Lorenz [30] discovered the three-dimensional (3D) independent chaotic system.…”
Section: Employed Chaotic Systemmentioning
confidence: 99%
“…In paper [32], aimed at addressing double-chaos-system and DNA-encryption algorithm that covers coupled-sequence set of lattice-chaos system and Optical-chaos-injection, novel image encryption then the transmission system is introduced with same chaos injection form laser with 2-optical responses, two (SL2 and SL1) can output the same chaotic signals can be served as one of the chaotic-carrier to pass on the given image and utilized to generate the encryption method. The rule of DNA complementary can be generated by 128-bit-key which is utilized original-value of dual-chaotic-system, therefore the key is one of the hypersensitive in the process of encryption and decryption process.…”
Section: Literature Surveymentioning
confidence: 99%
“…Since the gray value of a plain text image can be regarded as continuously changing, the correlation between adjacent pixels of the original image is very high [39]. The correlation coefficient can be used to quantitatively analyze the correlation of adjacent pixels.…”
Section: ) Pixel Correlation Analysismentioning
confidence: 99%