2022
DOI: 10.1016/j.ijleo.2022.168880
|View full text |Cite
|
Sign up to set email alerts
|

RGB image encryption based on symmetric keys using Arnold transform, 3D chaotic map and affine hill cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
18
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 41 publications
0
18
0
Order By: Relevance
“…Meanwhile, the fixed diffusion matrix also greatly reduces the diffusion effect [43]. Shaima, et al designed the affine Hill transform, whose essence was still the matrix diffusion, but did not give the generation method of the diffusion matrix set [44]. In addition, we also found that the modulo value of the diffusion matrix in these algorithms have to be 1.…”
Section: Introductionmentioning
confidence: 92%
“…Meanwhile, the fixed diffusion matrix also greatly reduces the diffusion effect [43]. Shaima, et al designed the affine Hill transform, whose essence was still the matrix diffusion, but did not give the generation method of the diffusion matrix set [44]. In addition, we also found that the modulo value of the diffusion matrix in these algorithms have to be 1.…”
Section: Introductionmentioning
confidence: 92%
“…In [13] suggested an encryption algorithm for 3D images based on the chaotic values generated by the chaotic system in addition to the substitution technique taken from the AES algorithm, the proposed method gave competitive results. In [14] proposed a triple image coding technique that combines the chaotic system‫و‬ Arnold synergistic approach and the affine Hill technique. The proposed method is good but very complex.…”
Section: Related Workmentioning
confidence: 99%
“…Among them, the encryption methods based on chaos theory for the fabrication of data security algorithms is a fundamental alluring option used by researchers. In recent years, various encryption schemes for digital images based on chaotic maps have been suggested [3][4][5][6][7][8][9][10][11][12][13][14]. These schemes either use lowdimensional and high-dimensional chaotic maps, or a mixture of them, or enhance the existing chaotic structures, or combine them with other techniques to encrypt the digital images.…”
Section: Introductionmentioning
confidence: 99%