2016
DOI: 10.14257/ijsia.2016.10.2.19
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Lossless Image Encryption Method using DNA Substitution and Chaotic Logistic Map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…(AC) (CT) (TG) (GA), we can draw this conclusion: C (A) = C, C (C) = T, C (T) = G, C (G) = A. As shown below, there are six complementary conversion methods that are allowed [24]:…”
Section: ) Dna Complementary Rulementioning
confidence: 73%
See 1 more Smart Citation
“…(AC) (CT) (TG) (GA), we can draw this conclusion: C (A) = C, C (C) = T, C (T) = G, C (G) = A. As shown below, there are six complementary conversion methods that are allowed [24]:…”
Section: ) Dna Complementary Rulementioning
confidence: 73%
“…The substitution method used in this article is a chaotic DNA transformation method [24]. There are two rules for DNA substitution, namely binary encoding rules and complementary rules.…”
Section: Dna Substitution Methodsmentioning
confidence: 99%
“…We consider it may be better than other encryption methods with the result analysis of previous work, such as Belazi et al. (2016), Chakraborty et al. (2016), Guesmi et al.…”
Section: Discussionmentioning
confidence: 97%
“…It can reduce to the integer order one with the difference order ] = 1 but the integer one does not hold the discrete memory. From (3) to (5), the domain is shifted from N + −] to N + and the function ( ) is preserved to be defined on the isolated time scale N in the fractional sums.…”
Section: Preliminariesmentioning
confidence: 99%
“…Nowadays, image encryption plays a significant role with the development of security technology in the areas of network, communication, and cloud service. Multifarious chaos-based image encryption algorithms have been developed up to now, such as in [1][2][3][4][5][6]; however a few of them have referred to the image encryption algorithm based on fractional discrete chaotic map accompanied with Elliptic Curve Cryptography (ECC).…”
Section: Introductionmentioning
confidence: 99%