2021
DOI: 10.1007/s00521-021-06552-z
|View full text |Cite
|
Sign up to set email alerts
|

2D fully chaotic map for image encryption constructed through a quadruple-objective optimization via artificial bee colony algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(10 citation statements)
references
References 70 publications
1
9
0
Order By: Relevance
“…According to Table 9, both values of these four images are close to the ideal values, which indicates that the encryption technique is highly sensitive to plain-text images. Meanwhile, it can be seen that the UACI and NPCR values of Baboon image obtained by the method proposed in this paper are approximately similar to the values of [23,27,39,43,44]. These results manifest that the encryption algorithm is comparable to other algorithms in terms of sensitivity to plain-text images.…”
Section: Resistance To Differential Attack Analysissupporting
confidence: 65%
See 1 more Smart Citation
“…According to Table 9, both values of these four images are close to the ideal values, which indicates that the encryption technique is highly sensitive to plain-text images. Meanwhile, it can be seen that the UACI and NPCR values of Baboon image obtained by the method proposed in this paper are approximately similar to the values of [23,27,39,43,44]. These results manifest that the encryption algorithm is comparable to other algorithms in terms of sensitivity to plain-text images.…”
Section: Resistance To Differential Attack Analysissupporting
confidence: 65%
“…Meanwhile, S-Box is used in image encryption technology to improve security and efficiency. Toktas, A. et al [23] introduced a 2D chaotic map of multi-objective optimization strategy based on an artificial bee colony algorithm, which is used in image encryption programs.…”
Section: Improved Two-dimensional Chaotic Maps Applied To Image Encryption Algorithmmentioning
confidence: 99%
“…Table 4 lists the x 2 values of the original image and the encrypted image and compares them with the x 2 values of the encrypted image using the methods proposed in the paper [3,19,29]. Compared with the compared papers, the proposed method reduces the x 2 value significantly and improves uniformity of pixel distribution.…”
Section: Testmentioning
confidence: 99%
“…lists the 𝑥 values of the original image and the encrypted compares them with the 𝑥 values of the encrypted image using the method in the paper [3,19,29]. Compared with the compared papers, the proposed m duces the 𝑥 value significantly and improves uniformity of pixel distribu this method, the x value is significantly reduced, and the pixel distribution is form compared to the listed papers.…”
Section: Information Entropymentioning
confidence: 99%
“…Hence, numerous image encryption algorithms have been proposed [9][10][11][12]. Due to the ergodicity and unpredictability of chaotic systems, chaos-based image encryption algorithms have been increasingly used [13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%