2023
DOI: 10.1007/s11227-023-05415-9
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight image encryption algorithm using NLFSR and CBC mode

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 34 publications
0
1
0
Order By: Relevance
“…Ensuring that these images remain confidential during transmission, safeguarding against theft or leakage has become a prominent research focus. 4 , 5 , 6 However, due to the distinctiveness of digital images, 7 , 8 , 9 such as high correlation of adjacent pixel points, scattering distribution of critical information, and high information redundancy, cryptographic protection using traditional text encryption algorithms struggles to meet real-time performance requirements. Furthermore, chaos itself exhibits inherent qualities 10 , 11 , 12 , 13 such as high sensitivity to initial conditions and control parameters, excellent pseudo-randomness, ergodicity, and long-term unpredictability of orbits, and it has many similarities with confusion, diffusion, and so on in cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…Ensuring that these images remain confidential during transmission, safeguarding against theft or leakage has become a prominent research focus. 4 , 5 , 6 However, due to the distinctiveness of digital images, 7 , 8 , 9 such as high correlation of adjacent pixel points, scattering distribution of critical information, and high information redundancy, cryptographic protection using traditional text encryption algorithms struggles to meet real-time performance requirements. Furthermore, chaos itself exhibits inherent qualities 10 , 11 , 12 , 13 such as high sensitivity to initial conditions and control parameters, excellent pseudo-randomness, ergodicity, and long-term unpredictability of orbits, and it has many similarities with confusion, diffusion, and so on in cryptography.…”
Section: Introductionmentioning
confidence: 99%