2021
DOI: 10.1007/s00500-021-06459-w
|View full text |Cite
|
Sign up to set email alerts
|

A new color image encryption technique using DNA computing and Chaos-based substitution box

Abstract: In many cases, images contain sensitive information and patterns that require secure processing to avoid risk. It can be accessed by unauthorized users who can illegally exploit them to threaten the safety of people’s life and property. Protecting the privacies of the images has quickly become one of the biggest obstacles that prevent further exploration of image data. In this paper, we propose a novel privacy-preserving scheme to protect sensitive information within images. The proposed approach combines deox… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
25
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(25 citation statements)
references
References 63 publications
0
25
0
Order By: Relevance
“…The ideal value of NPCR is 99.6093%, and the ideal value of UACI is 33.4635% [ 61 ]. The NPCR and UACI values of ciphertexts of different images obtained by our scheme are shown in Table 6 .…”
Section: Simulation and Security Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…The ideal value of NPCR is 99.6093%, and the ideal value of UACI is 33.4635% [ 61 ]. The NPCR and UACI values of ciphertexts of different images obtained by our scheme are shown in Table 6 .…”
Section: Simulation and Security Analysismentioning
confidence: 99%
“…Recently, some image encryption algorithms using chaotic S-Boxes have been proposed [ 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 ]. For example, Zhang et al developed an efficient chaotic image encryption scheme using alternate circular S-boxes with the chaotic S-boxes being produced by the Chen chaotic system [ 56 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Chaotic Shift Transform (CST) is proposed to change the position of image pixel efficiently whereas the row and column substitutions are applied to scramble the pixel values simultaneously. The optimization algorithm is proposed to resolve the constrained and unconstrained optimization problems for encryption [2]. This algorithm is based on the concept that the solution obtained for a given problem should move towards the best solution leaving beside the worst solution.…”
Section: Introductionmentioning
confidence: 99%
“…In the last years, there have been some S-box design algorithms developed based on chaotic systems and DNA computation. Masood et al [13], presented an approach that integrates DNA sequencing code, Arnold transformation, and a chaotic dynamical system to produce an initial S-box. A number of experiments have been performed in order to verify the randomness of this newly generated S-box.…”
mentioning
confidence: 99%