2019
DOI: 10.1007/s11042-019-07893-7
|View full text |Cite
|
Sign up to set email alerts
|

A new RGB image encryption using generalized heat equation associated with generalized Vigen$\grave {e}$re-type table over symmetric group

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 41 publications
0
12
0
Order By: Relevance
“…Apart from this, the R component's NPCR value is greater than the values of the schemes in [29,75], equal to that of [7,77], and comparable with [28,74,76]. The NPCR value of the G plane is greater than all the NPCR results of to the schemes in [7,28,29,[73][74][75][76][77]. Similarly, the NPCR results of the B component is better than the results of [7,28,29,[74][75][76][77][78].…”
Section: An Application To Encryption Of Color Imagesmentioning
confidence: 95%
See 3 more Smart Citations
“…Apart from this, the R component's NPCR value is greater than the values of the schemes in [29,75], equal to that of [7,77], and comparable with [28,74,76]. The NPCR value of the G plane is greater than all the NPCR results of to the schemes in [7,28,29,[73][74][75][76][77]. Similarly, the NPCR results of the B component is better than the results of [7,28,29,[74][75][76][77][78].…”
Section: An Application To Encryption Of Color Imagesmentioning
confidence: 95%
“…The NPCR value of the G plane is greater than all the NPCR results of to the schemes in [7,28,29,[73][74][75][76][77]. Similarly, the NPCR results of the B component is better than the results of [7,28,29,[74][75][76][77][78]. In addition, the average NPCR value resulting from the current scheme is greater than the NPCR results of all the listed schemes in Table 9.…”
Section: An Application To Encryption Of Color Imagesmentioning
confidence: 95%
See 2 more Smart Citations
“…Considering that spatiotemporal chaos is often created by local nonlinearity dynamics and spatial diffusion governed by coupled map lattices (CML), the chaos-based multiple image encryption algorithms by using CML were developed in [ 14 , 15 ]. For more spatiotemporal chaos-based cryptosystems, we refer the reader to [ 16 , 17 ] via the cellular automata, to [ 18 ] by using the generalized heat equation associated with GVTSG, or to [ 19 ] based on the DNA operation.…”
Section: Introductionmentioning
confidence: 99%