2017
DOI: 10.1016/j.jksuci.2016.02.003
|View full text |Cite
|
Sign up to set email alerts
|

A light weight secure image encryption scheme based on chaos & DNA computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
46
0
1

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 57 publications
(47 citation statements)
references
References 12 publications
0
46
0
1
Order By: Relevance
“…To test the resistance of the proposed encryption system against differential attack, where Differential attacks is the study of how any tiny alteration in the plain image can cause a significant difference in the cipher-image.In this experiment we have measured NPCR (number of pixels change rate) and UACI (unified average changing intensity) which are widely used for for differential attack analysis [27].…”
Section: Discussionmentioning
confidence: 99%
“…To test the resistance of the proposed encryption system against differential attack, where Differential attacks is the study of how any tiny alteration in the plain image can cause a significant difference in the cipher-image.In this experiment we have measured NPCR (number of pixels change rate) and UACI (unified average changing intensity) which are widely used for for differential attack analysis [27].…”
Section: Discussionmentioning
confidence: 99%
“…In this work, multiple chaotic maps are applied in permutation phase and XOR operation for diffusion. Bhasker Mondal et al describe a light weight secure encryption scheme based on chaos and DNA computing for grayscale images, in which encryption is implemented using 1D logistic map [3]. Dridi Manal and Mtibaa Abdellatif explain the encryption of medical images using DCT and two-dimensional Arnold Cat map in the paper 'crypto-compression of medical image based on DCT and chaotic system' [4].…”
Section: Introductionmentioning
confidence: 99%
“…Law enforcement agents may find it very difficult to stay afloat above the ill intentions of hackers.Therefore, people should pay more attention to the security of media data. Techniques like encryption [10], [11], stanography [15], watermarking [12], secret sharing [13], [9] etc are used to secure data during the transmission over public channel.…”
Section: Introductionmentioning
confidence: 99%
“…This paper presents a comparative study of some popular cryptographic image scrambling methods like generalized matrix-based scrambling (transformation) [5] using Arnold's transform [1] and Fibonacci transform [27], gray code with bit plane transformation [25], 2D mapping [20], key based row and column shifting [18], [10] and Fu et. al.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation