2019
DOI: 10.1016/j.ins.2018.11.010
|View full text |Cite
|
Sign up to set email alerts
|

A novel image cipher based on 3D bit matrix and latin cubes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
93
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 97 publications
(93 citation statements)
references
References 22 publications
0
93
0
Order By: Relevance
“…However, the simple visual inspection remains insufficient to judge the quality of a good encryption scheme. It is well known that many encryption schemes have been successfully violated using simple statistical and differential analysis are widely used to successfully validate the efficiency of encryption schemes [42][43][44][45][46][47][48][49][50][51][52][53][54]. The robustness of our proposed technique is similarly established via these simple, yet important tests as presented in the remainder of this subsection.…”
Section: Performance Testsmentioning
confidence: 91%
“…However, the simple visual inspection remains insufficient to judge the quality of a good encryption scheme. It is well known that many encryption schemes have been successfully violated using simple statistical and differential analysis are widely used to successfully validate the efficiency of encryption schemes [42][43][44][45][46][47][48][49][50][51][52][53][54]. The robustness of our proposed technique is similarly established via these simple, yet important tests as presented in the remainder of this subsection.…”
Section: Performance Testsmentioning
confidence: 91%
“…In [20], the image chaotic encryption algorithm consists of secret keys selection, Latin cube generation, scrambling encryption, and diffusion encryption, as shown in Figure 1, where key 0 , µ 0 , α, β, γ are the secret keys, x n (n = 0, 1, 2, • • • ) is a chaotic sequence generated by Logistic mapping, lx is a chaotic index sequence, L 1 , L 2 , L 3 are three Latin cubes, P is a 2D plain gray image, M is a bit cube representation of P, S 1 is a first-scrambling image of M, D is a diffusion image of S 1 , S 2 is a second-scrambling image of D, E is a 2D cipher gray image of S 2 , and B is generated by L 1 . When the size of the image is w × h, the length of x n and lx is q = 3 √ 8 × w × h, the side length of Latin cubes and bit cubes is q = 3 √ 8 × w × h, and the secret keys…”
Section: A Brief View Of An Image Chaotic Encryption Algorithmmentioning
confidence: 99%
“…Image chaotic encryption algorithms have attracted some special attention in the field of information security [1][2][3][4][5][6][7]. In recent years, many image chaotic encryption schemes combined chaos theories with other technologies, such as one-time keys [8], bit-level permutation [9], DNA operations [10][11][12][13], parallel computing system [14], matrix semi-tensor product theory [15], cellular automata [16,17], neural network [18,19], Latin square or Latin cube [20][21][22], and so on, have been proposed. However, the security issues of image chaotic encryption algorithms have also attracted much attention.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations