2021
DOI: 10.1007/s11071-021-06761-0
|View full text |Cite
|
Sign up to set email alerts
|

An efficient block-level image encryption scheme based on multi-chaotic maps with DNA encoding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(6 citation statements)
references
References 72 publications
0
6
0
Order By: Relevance
“…As a whole, the cipher images generated by the scheme introduced in this paper can gain higher NPCR and 040506-13 UACI grades than those in Refs. [32][33][34]37]. In the experiments, we found that when the plain image is modified to a certain extent, two cipher images with inconsistent dimen-sions will be produced after encryption, which improves its resistance to various attacks.…”
Section: Anti-differential Attack Analysismentioning
confidence: 93%
See 1 more Smart Citation
“…As a whole, the cipher images generated by the scheme introduced in this paper can gain higher NPCR and 040506-13 UACI grades than those in Refs. [32][33][34]37]. In the experiments, we found that when the plain image is modified to a certain extent, two cipher images with inconsistent dimen-sions will be produced after encryption, which improves its resistance to various attacks.…”
Section: Anti-differential Attack Analysismentioning
confidence: 93%
“…Therefore, under the condition that the precision of the floating-point number in the simulation platform is 10 −14 , the gross key space of this scheme is approximately 2 714 , which is much larger than some recently designed encryption schemes. [31][32][33][34] Next, taking the image "Sailboat" with a resolution of 512 × 512 as an instance to qualitatively analyze the key sensitivity level of this scheme, the gained experimental results are depicted in Fig. 17.…”
Section: Anti-violent Attack Analysismentioning
confidence: 99%
“…At present, the application of chaotic system for the information encryption becomes one of the most concerned research directions [2][3][4]. Due to the sensitivity and the randomness of the chaotic systems to initial conditions, when facing to the remote sensing image encryption, the encryption schemes based on chaos has particular advantages [5][6][7]. Thus, it is particularly important to select a remote sensing image encryption scheme with higher anti-cracking ability.…”
Section: Introductionmentioning
confidence: 99%
“…Wang et al [16] utilized a reworked version of the 1D Logistic map to jumble up the coordinates of individual pixels. Naskar et al [17] performed a diffusion operation using the Logistic map. However, criminal hackers' cracking technology is also maturing.…”
Section: Introductionmentioning
confidence: 99%