2020
DOI: 10.1049/iet-ipr.2019.0587
|View full text |Cite
|
Sign up to set email alerts
|

Parallel strength Pareto evolutionary algorithm‐II based image encryption

Abstract: In recent years, many image encryption approaches have been proposed on the basis of chaotic maps. The various types of chaotic maps such as one‐dimensional and multi‐dimensional have been used to generate the secret keys. Chaotic maps require some parameters and value assignment to these parameters is very crucial. Because, poor value assignments may make the chaotic map un‐chaotic. Therefore, hyper‐parameter tuning of chaotic maps is required. Recently, meta‐heuristic based image encryption approaches have b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
26
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
10

Relationship

1
9

Authors

Journals

citations
Cited by 54 publications
(27 citation statements)
references
References 70 publications
0
26
0
Order By: Relevance
“…With this step, the recognition and judgment on the infected tissue are over. 40,41 Step 4: RBM learning method. Restricted Boltzmann machine (RBM) is known as an energy-based model.…”
Section: Deep Learning Modelmentioning
confidence: 99%
“…With this step, the recognition and judgment on the infected tissue are over. 40,41 Step 4: RBM learning method. Restricted Boltzmann machine (RBM) is known as an energy-based model.…”
Section: Deep Learning Modelmentioning
confidence: 99%
“…Recently many researchers have designed various machine learning models such as to classify various kind of applications [ 9 , 13 ]. However, the majority of the existing models suffer from the over-fitting issue [ 15 , 16 , 29 ]. Therefore, in this paper, a novel fusion mdoel by using DCNN and vector space model is proposed to achieve better results.…”
Section: Literature Reviewmentioning
confidence: 99%
“…e initial parameters for 5D hyperchaotic are tuned by using the dual local search based multiobjective optimization, and the encryption architecture is based on two levels of permutation and diffusion. Similarly, the authors in [16][17][18] also used the hyperchaotic maps in a novel way for encrypting the images and obtained better results.…”
Section: Introductionmentioning
confidence: 99%