2021
DOI: 10.1007/s00542-020-05120-0
|View full text |Cite
|
Sign up to set email alerts
|

A robust image encryption framework based on DNA computing and chaotic environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…Currently, DNA computing algorithms for different complex problems are being proposed, for example, Wu et al [ 48 ] and Tian et al [ 31 ] used DNA computing to solve the family traveling salesperson problem and job shop scheduling problem respectively, achieving great efficiency gains in terms of algorithmic computational complexity. In addition, DNA computing has been increasingly applied to different scenarios, such as image recognition [ 53 ], artificial neural network design [ 54 ] and quantum computing [ 55 ]. It is foreseen that pioneering research in the cross-fertilisation of DNA computing with disciplinary needs will drive significant developments in many aspects of science and technology.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Currently, DNA computing algorithms for different complex problems are being proposed, for example, Wu et al [ 48 ] and Tian et al [ 31 ] used DNA computing to solve the family traveling salesperson problem and job shop scheduling problem respectively, achieving great efficiency gains in terms of algorithmic computational complexity. In addition, DNA computing has been increasingly applied to different scenarios, such as image recognition [ 53 ], artificial neural network design [ 54 ] and quantum computing [ 55 ]. It is foreseen that pioneering research in the cross-fertilisation of DNA computing with disciplinary needs will drive significant developments in many aspects of science and technology.…”
Section: Discussionmentioning
confidence: 99%
“…Proof. Set l � 􏽐 􏽐 (i, j) and the length of the different strands is: 41,8,5,53,58,24,35,11,48,38,1,39,28,33,20,37,26,55,43,10,56,22,18,23,54,44,3,50,27,42,6,34,19,14,25,51,36,59,49,45, 0] 60 [0, 34,3,26,23,58,53,5,18,1,9,16,8,…”
Section: Proofmentioning
confidence: 99%
“…DNA Algebraic Operations. Since the development of DNA computing, researchers have proposed using the algebraic operation of DNA sequence to replace the traditional computational algebraic operation [12,32,33]. In this article, different operations for DNA sequences have been used like addition, subtraction, multiplication, Xor, Xnor, and right circular shift, which moves the final entry to the first position and left circular shift, which moves the initial entry to the final position, as shown in Fig.…”
Section: Introductionmentioning
confidence: 99%
“…There are other algorithms that can help improve the proposed encryption system [46][47][48][49][50][51][52][53][54][55][56][57][58][59][60][61][62]. For example, RGB DNA image encryption technology was designed in [46].…”
Section: Introductionmentioning
confidence: 99%