2022
DOI: 10.1002/cpe.6814
|View full text |Cite
|
Sign up to set email alerts
|

An efficient chaotic system based hybrid radiation heat transfer sunflower optimization algorithm for securing digital image transmission

Abstract: At the pixel level, several chaos-based image encryption and decryption models have been developed throughout the years. However, due to long-haul, privacy, and security considerations, it has a number of drawbacks, including increased network complexity and low scalability, and actual text cracking avoidance is more challenging. In this study, we have proposed a novel approach for image encryption and decryption. The confusion and diffusion process is performed using fractional-order chaotic maps with the hyb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 42 publications
0
0
0
Order By: Relevance
“…A simple measure to evaluate the security of an encryption algorithm is to perform a histogram analysis. The more uniform the histogram distribution, the more difficult it is for an attack to infer the corresponding plaintext message based on the character distribution regularities [53,54]. In the histogram evaluation of text information, the ASCII values corresponding to the characters are presented, and the histogram of plaintext and ciphertext messages is shown in Fig 14.…”
Section: Analysis Of Histogramsmentioning
confidence: 99%
“…A simple measure to evaluate the security of an encryption algorithm is to perform a histogram analysis. The more uniform the histogram distribution, the more difficult it is for an attack to infer the corresponding plaintext message based on the character distribution regularities [53,54]. In the histogram evaluation of text information, the ASCII values corresponding to the characters are presented, and the histogram of plaintext and ciphertext messages is shown in Fig 14.…”
Section: Analysis Of Histogramsmentioning
confidence: 99%