2022
DOI: 10.3390/app12115321
|View full text |Cite
|
Sign up to set email alerts
|

5D Gauss Map Perspective to Image Encryption with Transfer Learning Validation

Abstract: Encryption of visual data is a requirementof the modern day. This is obvious and greatly required due to widespread use of digital communication mediums, their wide range of applications, and phishing activities. Chaos approaches have been shown to be extremely effective among many encryption methods. However, low-dimensional chaotic schemes are characterized by restricted system components and fundamental structures. As a result, chaotic signal estimation algorithms may be utilized to anticipate system proper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 28 publications
0
4
0
Order By: Relevance
“…The good encryption algorithm should have the capability to strive against statistical attack. This can be determined by analyzing correlation coefficients [14], entropy [13], mean absolute error (MAE) [6], PSNR [6], structure similarity index image (SSIM) [26], universal quality image index (UQII) [27], unified averaged changed intensity (UACI) [28], and Spatial correlation coefficient [28] of the encrypted image. By analyzing these metrics, we can evaluate the performance of an encryption algorithm and determine its effectiveness in providing security and confidentiality to the encrypted data.…”
Section: Resultsmentioning
confidence: 99%
“…The good encryption algorithm should have the capability to strive against statistical attack. This can be determined by analyzing correlation coefficients [14], entropy [13], mean absolute error (MAE) [6], PSNR [6], structure similarity index image (SSIM) [26], universal quality image index (UQII) [27], unified averaged changed intensity (UACI) [28], and Spatial correlation coefficient [28] of the encrypted image. By analyzing these metrics, we can evaluate the performance of an encryption algorithm and determine its effectiveness in providing security and confidentiality to the encrypted data.…”
Section: Resultsmentioning
confidence: 99%
“…Traditionally, the images are protected by encryption algorithms that convert the original image into an unknown format, such as a noise-like or texture-like format [20][21][22][23]. In this way, it is evident that sensible information is presented in an unknown format, which leads to several tentative attacks.…”
Section: Related Workmentioning
confidence: 99%
“…The unpredictable and non-periodic characteristics of chaos can be used to enhance algorithm performance. There are many types of chaotic mappings currently used for optimization algorithms, including Tent mapping [18], Circle mapping [19], Gauss mapping [20], etc. In this paper, the population is initialized using the Circle mapping, defined as equation (11) where τ and λ are constants.…”
Section: Initializing Population With Chaotic Mappingmentioning
confidence: 99%