2019
DOI: 10.3390/e21111075
|View full text |Cite
|
Sign up to set email alerts
|

3C3R, an Image Encryption Algorithm Based on BBI, 2D-CA, and SM-DNA

Abstract: Color image encryption has enticed a lot of attention in recent years. Many authors proposed a chaotic system-based encryption algorithms for that purpose. However, due to the shortcomings of the low dimensional chaotic systems, similar rule structure for RGB channels, and the small keyspace, many of those were cryptanalyzed by chosen-plaintext or other well-known attacks. A Security vulnerability exists because of the same method being applied over the RGB channels. This paper aims to introduce a new three-ch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 101 publications
0
3
0
Order By: Relevance
“…Table 17 contains the PSNR, NPCR, and UACI values of the Lena image for different cropped portion, while Table 18 carries the comparison of the occlusion test for the Lena image. The PSNR, MSE, and UACI of the recovered images are better than References 68,76. While NPCR value is comparable with those algorithms.…”
Section: Results and Security Analysismentioning
confidence: 70%
“…Table 17 contains the PSNR, NPCR, and UACI values of the Lena image for different cropped portion, while Table 18 carries the comparison of the occlusion test for the Lena image. The PSNR, MSE, and UACI of the recovered images are better than References 68,76. While NPCR value is comparable with those algorithms.…”
Section: Results and Security Analysismentioning
confidence: 70%
“…Table 9 lists a comparison of the PSNR and MSE of the Lena image with different cropped portions. The higher PSNR values and lower MSE values, as compared to [64,68], prove that proposed algorithm can retrieve images without losing substantial information. (g) retrieved image of (a); (h) retrieved image of (b); (i) retrieved image of (c); (j) retrieved image of (d); (k) retrieved image of (e); (l) retrieved image of (f).…”
Section: Robustness Against Occlusion Attackmentioning
confidence: 84%
“…In this type of attack, an adversary attempts to guess the correct security key by exhaustively scanning the key space of an encryption algorithm. Therefore, to protect the algorithm from an assault using brute force, having a key space that is sufficiently large is one of the primary criteria that can guarantee higher safety [36]. In an image encryption algorithm, the key space is the collection of all of the employed secret keys that can be utilized to decrypt images.…”
Section: Key Spacementioning
confidence: 99%