2020
DOI: 10.3390/e22060640
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Hybrid Secure Image Encryption Based on the Shuffle Algorithm and the Hidden Attractor Chaos System

Abstract: Aiming at the problems of small key space, low security of encryption structure, and easy to crack existing image encryption algorithms combining chaotic system and DNA sequence, this paper proposes an image encryption algorithm based on a hidden attractor chaotic system and shuffling algorithm. Firstly, the chaotic sequence generated by the hidden attractor chaotic system is used to encrypt the image. The shuffling algorithm is used to scramble the image, and finally, the DNA sequence operation is used to dif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 59 publications
0
6
0
Order By: Relevance
“…The DNA sequence of biology contains four nucleic acid bases i.e., A (Adenine), C (Cytosine), G (Guanine), and T (Thymine), where A and T, G, and C are complementary, respectively [ 49 ]. In binary computing, 0 and 1 are complementary, so the binary digits 00 and 11 are complementary, as well as 01 and 10.…”
Section: Relevant Knowledgementioning
confidence: 99%
“…The DNA sequence of biology contains four nucleic acid bases i.e., A (Adenine), C (Cytosine), G (Guanine), and T (Thymine), where A and T, G, and C are complementary, respectively [ 49 ]. In binary computing, 0 and 1 are complementary, so the binary digits 00 and 11 are complementary, as well as 01 and 10.…”
Section: Relevant Knowledgementioning
confidence: 99%
“…Given the good stability of the singular values, an improved image hiding algorithm is proposed. References [ 18 , 19 , 20 , 21 ] proposed a complex valued encrypted image hiding technology based on carrier image DCT, which realized the hiding and extraction of the image information in the carrier images. Therefore, after extracting the data hidden in the picture, the original image can be restored without loss.…”
Section: Related Workmentioning
confidence: 99%
“…The various approaches involve AES with visual cryptography which offers good results by encrypting the image using AES and the original key using visual cryptography by converting it to an image. The algorithm is still susceptible to an attack on the shared image created for the key [ 21 , 22 ]. Hashim et al [ 23 ] used ElGamal encryption as an asymmetric encryption algorithm and have been tested using MATLAB.…”
Section: Literature Reviewmentioning
confidence: 99%