2022
DOI: 10.1007/s11042-022-13612-6
|View full text |Cite
|
Sign up to set email alerts
|

New color image encryption technique based on three-dimensional logistic map and Grey wolf optimization based generated substitution boxes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(13 citation statements)
references
References 27 publications
0
12
0
Order By: Relevance
“…Against Khan et. al [40], the observed increase is minimal at 0.04%, emphasizing the proposed approach's ability to uphold the desired level of entropy for effective image encryption. Overall, the proposed method's consistently high IE values affirm its positive performance and suitability for applications requiring secure and robust image encryption.…”
Section: E Comparison Of Image Entropy (Ie)mentioning
confidence: 83%
See 1 more Smart Citation
“…Against Khan et. al [40], the observed increase is minimal at 0.04%, emphasizing the proposed approach's ability to uphold the desired level of entropy for effective image encryption. Overall, the proposed method's consistently high IE values affirm its positive performance and suitability for applications requiring secure and robust image encryption.…”
Section: E Comparison Of Image Entropy (Ie)mentioning
confidence: 83%
“…Similar trends are observed in the comparison with Hussain et.al [42], where the proposed method showcases an improvement of about 0.882%, and against Khan et. al [40], with a slight improvement of 0.011%. Overall, the proposed approach demonstrates competitive performance in terms of NPCR, suggesting its effectiveness in image encryption.…”
Section: Comparison Of Normalized Pixel Change Rate (Npcr)mentioning
confidence: 93%
“…From the results of the above scholars, although high-dimensional chaos achieves better encryption than low-dimensional chaos, the complexity of the structure makes it more difficult to realize, and the time cost is higher. Literature [15] proposes an encryption scheme that utilizes three-dimensional (3D) logistic and S-boxes for obfuscation. Simulation results illustrate the advantages of this proposal in the design of encryption schemes.…”
Section: Related Researchmentioning
confidence: 99%
“…Central to the SubBytes step is the S-box, which is a critical nonlinear element to create turmoil. There are various studies on the optimization [16,17] of the S-box and its applications [18][19][20][21]. For the original AES S-box, Huang et al [22] proposed two garbling schemes aimed at minimizing the total and online times, respectively.…”
Section: Our Ideamentioning
confidence: 99%
“…Since the final truth values of the output are determined by the lsb of the output wire labels, and there are only XOR operations between wire labels in other parts of the AES circuit, flipping the lsb of the input wire labels of the S-box can eventually produce the correct output, thus reducing the number of ciphertexts by converting the encryption of eight output wire labels into only one flip bit string. Furthermore, by introducing optimized S-box structures [16][17][18][19][20][21], where each flip bit string is almost exclusively mapped to an input byte, the security of our garbling scheme can be effectively improved without additional overhead.…”
Section: Our Ideamentioning
confidence: 99%