2019
DOI: 10.3390/e21070656
|View full text |Cite
|
Sign up to set email alerts
|

An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic—Tent Map

Abstract: Nowadays, the images are transferred through open channels that are subject to potential attacks, so the exchange of image data requires additional security in many fields, such as medical, military, banking, etc. The security factors are essential in preventing the system from brute force and differential attacks. We propose an Enhanced Logistic Map (ELM) while using chaotic maps and simple encryption techniques, such as block scrambling, modified zigzag transformation for encryption phases, including permuta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
70
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 108 publications
(71 citation statements)
references
References 61 publications
0
70
0
1
Order By: Relevance
“…Furthermore, if the encryption algorithm has a less sensitive key, then any insignificant change in the real secret key will also lead to proper decryption of the actual image. Thus, a secret key of algorithm may seem corrupted, and as a result, the real key space will be smaller than the theoretical one [45,46] . Therefore, in order to further analyze the key sensitivity of our algorithm, we performed another experiment over the fruit image, in the encryption and decryption steps, by altering only one bit in the actual key, as shown below: Key o is the actual key, while Key 1 and Key 2 have only a one-bit key difference from the left-most side and the right-most side of the bit, respectively.…”
Section: Key Space and Key Sensitivitymentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, if the encryption algorithm has a less sensitive key, then any insignificant change in the real secret key will also lead to proper decryption of the actual image. Thus, a secret key of algorithm may seem corrupted, and as a result, the real key space will be smaller than the theoretical one [45,46] . Therefore, in order to further analyze the key sensitivity of our algorithm, we performed another experiment over the fruit image, in the encryption and decryption steps, by altering only one bit in the actual key, as shown below: Key o is the actual key, while Key 1 and Key 2 have only a one-bit key difference from the left-most side and the right-most side of the bit, respectively.…”
Section: Key Space and Key Sensitivitymentioning
confidence: 99%
“…Likewise, by calculating the variances of the histograms, we assessed the consistency of the encrypted images. If the variance of an encrypted images is smaller, then the uniformity (and the security level) of the particular image encryption algorithm is greater [45,46].…”
Section: Histogram Analysismentioning
confidence: 99%
“…The table values in bold fonts clearly concludes that our 3C3R overall performing much better than Refs. [56,62,76,91]. Hence, our 3C3R assures better image security.…”
Section: Performance Comparisonmentioning
confidence: 93%
“…It is a statistical measure used to evaluate the level of similarity between two adjacent pixels in the image or between two pixels in the same location of the original and encrypted image [18]. Karl Pearson in 1895 defined the equation for calculating the correlation coefficient called r which it is most used in statistical security analysis.…”
Section: Correlation Coefficientsmentioning
confidence: 99%