2019
DOI: 10.1007/s11042-019-08108-9
|View full text |Cite
|
Sign up to set email alerts
|

Images encryption algorithm based on the quaternion multiplication and the XOR operation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 30 publications
1
8
0
Order By: Relevance
“…We can also find that with the increase of pixel diffusion times, the correlation coefficient is closer to 0. The comparative test results are given in the Table 3, which shows that the value of the algorithm in this paper is closer to 0 compared with similar encryption algorithms of Refs [13,40].…”
Section: Correlation Coefficient Textmentioning
confidence: 77%
See 3 more Smart Citations
“…We can also find that with the increase of pixel diffusion times, the correlation coefficient is closer to 0. The comparative test results are given in the Table 3, which shows that the value of the algorithm in this paper is closer to 0 compared with similar encryption algorithms of Refs [13,40].…”
Section: Correlation Coefficient Textmentioning
confidence: 77%
“…The minimum variance of the original image is about 2.1193 Ă— 10 4 , while the minimum variance of the password image decreases to about 7974.6, which shows that the histogram distribution of the password image is evenly distributed, and our algorithm is highly secure. In the scheme proposed in the paper, the average value of the λ 2 is only 254.5, which is lower than that of Refs [13,40]. * The encryption method of color image is not given in Ref [13].…”
Section: The λ 2 Textmentioning
confidence: 88%
See 2 more Smart Citations
“…Image encryption approaches are categorized into symmetric and asymmetric key cryptography 5 , 6 . Recently, different architectures were proposed to encryption images such as optical image encryption 7 , 8 , DNA coding 9 , 10 , XOR operation 11 , 12 and quantum image encryption 13 – 16 . Since chaotic systems are sensitive to the initial conditions, various encryption algorithms based on chaotic systems were proposed.…”
Section: Introductionmentioning
confidence: 99%