2014
DOI: 10.1007/s11042-014-2221-x
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
66
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 162 publications
(67 citation statements)
references
References 32 publications
1
66
0
Order By: Relevance
“…for confidence level = 0.05, and the average results for the four images "cameraman", "pepper", "rice" and "autumn" are demonstrated in Table 6. It can be seen that the chi-square value of the histogram of the cyphertext images are less than 295.5, which means that the histogram of the cyphertext image has passed Chi-square test for confidence level =0.05 and better than in Kulsoom [37].…”
Section: Statistical Histogram Analysismentioning
confidence: 95%
“…for confidence level = 0.05, and the average results for the four images "cameraman", "pepper", "rice" and "autumn" are demonstrated in Table 6. It can be seen that the chi-square value of the histogram of the cyphertext images are less than 295.5, which means that the histogram of the cyphertext image has passed Chi-square test for confidence level =0.05 and better than in Kulsoom [37].…”
Section: Statistical Histogram Analysismentioning
confidence: 95%
“…Therefore, small key space cannot resist brute-force attack. For achieving high resistance against a brute-force attack, the size of the key space should be larger than 2 128 [39,40]. Security key of the proposed algorithm is generated by SHA-256 hash, whose output result is 256-bit long.…”
Section: Key Space Analysismentioning
confidence: 99%
“…Actually, most of these schemes have a high level of security, as opposed to a high implementation cost. Moreover, some new technologies have been introduced to the design and security analysis of image encryption schemes such as neural network [33], DNA coding [34], genetic recombination [31], compressed sensing [35], and machine leaning [36]. In general, there exists an irreconcilable contradiction between the security and implementation complexity of cryptographic algorithms.…”
Section: Introductionmentioning
confidence: 99%