2018
DOI: 10.1016/j.jisa.2018.08.001
|View full text |Cite
|
Sign up to set email alerts
|

Novel method for image security system based on improved SCAN method and pixel rotation technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Entropy is the rate at which information is produced by a stochastic source of data. To build a perfect encryption system, the entropy of enciphered data of a table approaches the optimal state is required, and can be calculated according to the equation [13,15,16]: -…”
Section: Information Entropy Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Entropy is the rate at which information is produced by a stochastic source of data. To build a perfect encryption system, the entropy of enciphered data of a table approaches the optimal state is required, and can be calculated according to the equation [13,15,16]: -…”
Section: Information Entropy Analysismentioning
confidence: 99%
“…It is a try to get the decryption key using a simple variation in the input. Here, the large enough output variation, the more difficult for an attacker to find the decryption key [13][14][15]. A reliable cipher system must distribute the effect of The differential attack is analyzed by calculating the sum of the absolute difference (SAD) between each pair of encrypted databases.…”
Section: Differential Attack Analysismentioning
confidence: 99%
“…4, confirmed that the presented method achieved an efficient result after encryption. In addition to the visual result, the distribution of pixels can be justified by a quantitative measure known as chi-square, defined by the following mathematical formula [41].…”
Section: Histogram Testmentioning
confidence: 99%
“…It has been efficiently and largely exploited by many research studies from different fields. As for example, Digital Image Processing (DIP) has been used to carry out a real-time response for security purposes due to its images high resolution(s) by exploiting pixel intensities and variations for a varied diversity of purposes some of which are extensively and technically described and reviewed in [1][2][3][4][5][6][7][8][9][10][11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%