2022
DOI: 10.3390/e24060803
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption Using a Spectrally Efficient Halton Logistics Tent (HaLT) Map and DNA Encoding for Secured Image Communication

Abstract: With the advancement of technology worldwide, security is essential for online information and data. This research work proposes a novel image encryption method based on combined chaotic maps, Halton sequence, five-dimension (5D) Hyper-Chaotic System and Deoxyribonucleic Acid (DNA) encoding. Halton sequence is a known low-discrepancy sequence having uniform distribution in space for application in numerical methods. In the proposed work, we derived a new chaotic map (HaLT map) by combining chaotic maps and Hal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 53 publications
0
5
0
Order By: Relevance
“…Ref [20] 64.00 99.7000 0.00280 7.9854 --Ref [22] 64.00 -0.00820 7.9900 --Ref [23] 64.00 99.6157 -0.00049 7.9980 --Ref [18] 64.00 99.5392 0.01970 7.9975 7.2361 7.4312 Ref [28] 64.00 99.7800 0.00570 7.9993 2.2230 2.3220 Ref [29] 64.00 99.6130 -7.9975 --Ref [31] 64.00 99.6200 -7.9975 1.1247 1.1247 Ref [33] 64…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Ref [20] 64.00 99.7000 0.00280 7.9854 --Ref [22] 64.00 -0.00820 7.9900 --Ref [23] 64.00 99.6157 -0.00049 7.9980 --Ref [18] 64.00 99.5392 0.01970 7.9975 7.2361 7.4312 Ref [28] 64.00 99.7800 0.00570 7.9993 2.2230 2.3220 Ref [29] 64.00 99.6130 -7.9975 --Ref [31] 64.00 99.6200 -7.9975 1.1247 1.1247 Ref [33] 64…”
Section: Discussionmentioning
confidence: 99%
“…Patel and Veeramalai [33] presented a new image cryptosystem based on combined chaotic maps, Halton sequence, five-dimensional (5D) Hyper-Chaotic System and DNA encoding. The secret key is formed by XOR-ing two hash values of the input image before and after scrambling it using the HaLT map.…”
Section: Related Workmentioning
confidence: 99%
“…Correlation analysis is used to determine the strength of the encrypting system. According to (10), (11) and (12) are the mathematical formula for calculating the correlation coefficient values [23], [28], [25]:…”
Section: Correlation Analysismentioning
confidence: 99%
“…Redistributing the locations of pixels without changing the data in the first stage. Changing the values of pixels to achieve certain information protection in the second stage [11], [12]. For the encryption algorithm to be strong and the encrypted image [13].…”
Section: Introductionmentioning
confidence: 99%
“…The designed algorithm is secure and sensitive to secret keys [18]. Although high-dimensional chaotic systems have more control parameters and can provide a larger parameter space for cryptosystems, their keystream generation efficiency is not high [19][20][21]. The low-dimensional chaotic system has smaller control parameters, and its key stream generation is efficient.…”
Section: Introductionmentioning
confidence: 99%