2021
DOI: 10.3390/sym13050824
| View full text |Cite
|
Sign up to set email alerts
|

Abstract: One of the general problems in modern digital society is undoubtedly the information security topic. It is critical to ensure the security of information transferred, processed, and stored throughout digital channels. Among this information, digital images draw attention in terms of frequency of use in digital channels. In this study, a new image encryption algorithm is proposed to address the security problems of digital images. The aspect that differentiates the proposed algorithm from thousands of image enc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(8 citation statements)
references
References 70 publications
(102 reference statements)
0
8
0
Order By: Relevance
“…For asymmetric cryptography, a pair of public and secret keys is required. , Our PUF key has a good performance in terms of randomness, uniformity, and uniqueness, promising to work as a highly trustworthy key in encryption due to its irreproducibility and true randomness. We can apply the Vernam algorithm (also known as a kind of stream cipher in symmetric cryptography) to encrypt and decrypt images. , The detailed procedures are described in Section III in the Supporting Information. The exclusive OR (XOR) operation (as demonstrated in Section II in the Supporting Information) between information and the secured key will leak no information.…”
Section: Results and Discussionmentioning
confidence: 99%
“…For asymmetric cryptography, a pair of public and secret keys is required. , Our PUF key has a good performance in terms of randomness, uniformity, and uniqueness, promising to work as a highly trustworthy key in encryption due to its irreproducibility and true randomness. We can apply the Vernam algorithm (also known as a kind of stream cipher in symmetric cryptography) to encrypt and decrypt images. , The detailed procedures are described in Section III in the Supporting Information. The exclusive OR (XOR) operation (as demonstrated in Section II in the Supporting Information) between information and the secured key will leak no information.…”
Section: Results and Discussionmentioning
confidence: 99%
“…Chaotic time-series obtained from a non-equilibrium system are used to construct S-boxes and develop an image encryption application by Wang et al [12] in 2019. Furthermore, researchers proposed to use different chaotic dynamical systems as entropy source; circuit realization, control design and image encryption application of their proposed system such as extended Lü system [13], autonomous RLCC-Diodes-Opamp chaotic oscillator [14,15], modified Chua's circuit [16], a new chaotic jerk system [17] and chaotic one dimensional maps [18][19][20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%
“…Adeyemi et al introduced the FPGA realization of chaos-encrypted transmission via the parameter-switching technique [16]. Muhammad and Ozkaynak combined chaos, optimization algorithms and physical unclonable functions to design the novel image encryption [17]. Many studies focused on random number generators [18][19][20].…”
Section: Introductionmentioning
confidence: 99%