2022
DOI: 10.1007/s00371-022-02736-3
|View full text |Cite
|
Sign up to set email alerts
|

New color image encryption using hybrid optimization algorithm and Krawtchouk fractional transformations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 69 publications
0
9
0
Order By: Relevance
“…Discrete orthogonal moments [44] play a prominent role in signal and image analysis, and their usefulness extends to a multitude of varied applications. They have been successful in areas such as classification, reconstruction, watermarking, encryption, and compression [45][46][47][48][49]. They are a versatile tool for representing and processing complex data.…”
Section: Reconstruction Of 2d and 3d Signals And Images Using Meixner...mentioning
confidence: 99%
“…Discrete orthogonal moments [44] play a prominent role in signal and image analysis, and their usefulness extends to a multitude of varied applications. They have been successful in areas such as classification, reconstruction, watermarking, encryption, and compression [45][46][47][48][49]. They are a versatile tool for representing and processing complex data.…”
Section: Reconstruction Of 2d and 3d Signals And Images Using Meixner...mentioning
confidence: 99%
“…The values of the pixels vary throughout the diffusion phase corresponding with the chaotic random sequence. Until the pixel values are all modified and the encryption is finished, repeat the two actions multiple times [25], [42][43][44][45]. Since the majority of the images have substantial relationships between adjacent pixels, we substitute the RGB image pixels using chaotic sequences to get rid of the correlations.…”
Section: Three Dimensional Substitution Bit Levelsmentioning
confidence: 99%
“…In recent decades, many researchers [37][38][39][40] have established high-dimensional methods of encryption very quickly to address security issues that prevent low-dimensional encryption from meeting requirements, given the speed at which modern communication is developing. Moreover, in [41][42][43][44][45], good encryption and good statistical properties are achieved, which leads to good security and integrity for the data transmission but with high complexity and limited key space for encryption.…”
Section: Introductionmentioning
confidence: 99%
“…Traditional encryption algorithms used for remote sensing images suffer from weak security, susceptibility to attack, and low encryption efficiency. Many image encryption algorithms have been proposed to address these challenges, which can be based on such things as chaotic functions [2,3], DNA coding [4][5][6], meta-cellular automata [7,8], meta-heuristic techniques [9][10][11], S-boxes [12,13], asynchronous updating Boolean networks [14], and Fourier and wavelet transforms [15,16]. Zou et al [17] introduced ICCTML, an enhanced dynamic model that combines Tent chaotic systems and cross-coupled mappings, offering greater convenience, a wider chaotic range, and higher information entropy.…”
Section: Introductionmentioning
confidence: 99%