Proceedings of the 2nd International Conference on Networking, Information Systems &Amp; Security 2019
DOI: 10.1145/3320326.3320361
|View full text |Cite
|
Sign up to set email alerts
|

A New Image Encryption Scheme Based on Enhanced Elliptic Curve Cryptosystem Using DNA Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…Salma et., al. (25) introduced the image encryption techniques by using ECC and DNA computing techniques. In this, the initial pixel value of the plain image is encrypted by the ECC encryption algorithm, and the resultant image is allowed to map with a DNA sequence.…”
Section: Fpga Implementations Of Eccmentioning
confidence: 99%
“…Salma et., al. (25) introduced the image encryption techniques by using ECC and DNA computing techniques. In this, the initial pixel value of the plain image is encrypted by the ECC encryption algorithm, and the resultant image is allowed to map with a DNA sequence.…”
Section: Fpga Implementations Of Eccmentioning
confidence: 99%
“…Input the key pairs (k, u 0 + λ) of Chebyshev map to generate random sequence, where the random sequence has 3×256×256+3000 random data. The threshold scheme (6,8) is used in the sharing stage. Meanwhile, in the identity authentication and blind signcryption stage, when the encryption key of ECC is 200bit, it can ensure security and better than 176bit [33].…”
Section: Experimental Analysis and Performance Comparisonmentioning
confidence: 99%
“…Lena is chosen to analyze the key sensitivity. In the ideal state, the average of NPCR is about 0.9961, and the average of UACI is about 0.3346 [8]. Suppose that P 1 (i, j) and P 2 (i, j) are the (i, j) th pixel of the image P i and P 2 .…”
Section: F Key Sensitivity Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…In [30], images are transformed into one-dimensional sequence, then pixels are shuffled using chaotic and DNA based permutation, afterward a DNA-diffusion process is used to generate the cipher. Efficiency and simplicity of DNA and Elliptic Curve (EC) cryptography are combined with [31]. In this technique, image pixels are first mapped into EC points, each point and the random key values are converted into DNA sequence, then encrypted using a DNA chosen operation to generate the cipher.…”
Section: Literature Reviewmentioning
confidence: 99%