2022
DOI: 10.1007/s11042-022-12762-x
|View full text |Cite
|
Sign up to set email alerts
|

A new image encryption based on bit replacing, chaos and DNA coding techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 53 publications
(6 citation statements)
references
References 57 publications
0
6
0
Order By: Relevance
“…Suppose attackers or any naked eye suspects the technique used in the proposed algorithm which is LSB and some improved technique of steganalysis. Then attacker canโ€™t extract the actual contents of the secret message because the proposed method used Huffman code 64 , 65 , MLE 66 , Magic matrix 67 , 68 , and HSI (achromatic components of an image) 69 . If an attacker extracts the message up to some limits then the contents are useless, because, for extraction of the full message text, attackers need to use Huffman code, MLE, etc.…”
Section: Resultsmentioning
confidence: 99%
“…Suppose attackers or any naked eye suspects the technique used in the proposed algorithm which is LSB and some improved technique of steganalysis. Then attacker canโ€™t extract the actual contents of the secret message because the proposed method used Huffman code 64 , 65 , MLE 66 , Magic matrix 67 , 68 , and HSI (achromatic components of an image) 69 . If an attacker extracts the message up to some limits then the contents are useless, because, for extraction of the full message text, attackers need to use Huffman code, MLE, etc.…”
Section: Resultsmentioning
confidence: 99%
“…The Alpha blending ( 9) is written as: ๐‘Š๐‘Ž๐‘ก๐‘’๐‘Ÿ๐‘š๐‘Ž๐‘Ÿ๐‘˜๐‘’๐‘‘ ๐ผ๐‘š๐‘Ž๐‘”๐‘’ = (1 โˆ’ ๐›ผ)๐ฟ๐ฟ ๐‘๐‘œ๐‘ฃ๐‘’๐‘Ÿ + ๐›ผ๐ฟ๐ฟ ๐‘ ๐‘’๐‘๐‘Ÿ๐‘’๐‘ก (9) Where, ฮฑ is a constant value that varies from 0 to 1 LLCover is the LL band coefficients of the cover image LLSecret is the LL band coefficients of the secret image Figure 4 shows the hardware architecture of the Alpha Blending technique. To get the optimized hardware utilizations efficient Koggy-Stone Adder/Subtractor [25] and Vedic multiplier [26] are used. To synchronize the watermarked data with the clk signal the D Flip Flop (DFF) is used.…”
Section: Bgaussian Filtermentioning
confidence: 99%
“…Therefore, the diffusion stage is required to change the pixel value to improve the security performance. The commonly used diffusion methods are the exclusive OR (XOR) operation [32][33][34], modulus operation [26,35,36], DNA/RNA operation [28,37,38], bit plane operation [39][40][41], etc. Teng, et al combined the XOR operation with the index scrambling to obtain desirable encryption effect [32].…”
Section: Introductionmentioning
confidence: 99%