2021
DOI: 10.3390/electronics10091066
|View full text |Cite
|
Sign up to set email alerts
|

New Image Encryption Algorithm Using Hyperchaotic System and Fibonacci Q-Matrix

Abstract: In the age of Information Technology, the day-life required transmitting millions of images between users. Securing these images is essential. Digital image encryption is a well-known technique used in securing image content. In image encryption techniques, digital images are converted into noise images using secret keys, where restoring them to their originals required the same keys. Most image encryption techniques depend on two steps: confusion and diffusion. In this work, a new algorithm presented for imag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 77 publications
(30 citation statements)
references
References 50 publications
0
30
0
Order By: Relevance
“…e cryptosystems used before this all belong to the private key cryptosystem, that is, the sender and the receiver of information use the same or similar key, and the key needs to be negotiated and transmitted before information is transmitted, as shown in Figure 1 for the data encryption system model [14,15]. Subsequently, the rst practical public key cryptosystem, RSA, was proposed.…”
Section: Literature Reviewmentioning
confidence: 99%
“…e cryptosystems used before this all belong to the private key cryptosystem, that is, the sender and the receiver of information use the same or similar key, and the key needs to be negotiated and transmitted before information is transmitted, as shown in Figure 1 for the data encryption system model [14,15]. Subsequently, the rst practical public key cryptosystem, RSA, was proposed.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The Peak Signal to Noise Ratio (PSNR) was calculated for all the input images and their corresponding decrypted images to tabulate the quality of the decryption algorithm, given in Table 9 . The tabulation also compared the proposed work with ‘state of the art; techniques [ 41 , 45 , 46 , 47 ], and shows that the values obtained were approximately equal to the existing methods. Figure 19 shows the 6.25%, 25% and 50% cropping attack analysis on the Lena test image.…”
Section: Resultsmentioning
confidence: 88%
“…In this section, various simulations and tests were performed on five test images [ 44 ], which are displayed in Figure 14 : namely, Lena, Baboon, Goldhill, Cameraman and Bridge of size [ ]. The simulation results were compared with the ‘state of the art’ techniques [ 18 , 35 , 36 , 38 , 41 , 45 , 46 , 47 , 48 , 49 ], on the basis of correlation, information entropy, NPCR, UACI, cropping attack and noise attack. The subsections below show the various tests performed on the proposed method.…”
Section: Resultsmentioning
confidence: 99%
“…This paper uses information entropy to quantitatively compare the randomness of images before and after encryption. The larger the information entropy value, the stronger the randomness of the information distribution of the image and the better the encryption effect [ 22 ]. The ideal information entropy of the ciphertext image is eight, indicating that the information distribution of the image is completely random.…”
Section: Security Analysismentioning
confidence: 99%