2020
DOI: 10.1007/s11042-020-09237-2
|View full text |Cite
|
Sign up to set email alerts
|

An image encryption approach based on chaotic maps and genetic operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
29
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 63 publications
(29 citation statements)
references
References 38 publications
0
29
0
Order By: Relevance
“…Where ( ) is the probability of of occurrence for each . For a perfect random information source with 256 = 2 8 states, the ideal value of entropy equal 8. Table 8 gives the different entropy values obtained by our method.…”
Section: Entropy Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Where ( ) is the probability of of occurrence for each . For a perfect random information source with 256 = 2 8 states, the ideal value of entropy equal 8. Table 8 gives the different entropy values obtained by our method.…”
Section: Entropy Analysismentioning
confidence: 99%
“…Finally a genetic algorithm is used to select the best encrypted image. The authors of [8] propose a new image encryption algorithm based on the confusion-diffusion process, which are established a bit permutation and genetic operations, such as selection, crossover and mutation at the DNA nucleotides sequences. K.C.…”
Section: Introductionmentioning
confidence: 99%
“…In [20], the authors combine Brownian motion with ternary unique orientation with chaotic dynamical map to design a new cryptographical algorithm. A novel image encryption algorithm using chaotic maps and genetic operations was presented in [21]. A novel encryption algorithm that depended on a new S-Box and logistic-sine system (LSS) has been proposed in [22].…”
Section: Introductionmentioning
confidence: 99%
“…erefore, the traditional encryption algorithm has the disadvantage of low efficiency when encrypting digital images [2]. Based on the huge demands for protecting information security, in recent years, many researchers have proposed a number of new encryption algorithms to protect information security [3][4][5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%