2023
DOI: 10.1016/j.matcom.2023.01.036
|View full text |Cite
|
Sign up to set email alerts
|

An Innovative approach towards image encryption by using novel PRNs and S-boxes Modeling techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Digital imaging holds several benefits, resulting in overwhelming demand for its applications [1]. Yet ensuring data security against unauthorized access or use is difficult.…”
Section: Introductionmentioning
confidence: 99%
“…Digital imaging holds several benefits, resulting in overwhelming demand for its applications [1]. Yet ensuring data security against unauthorized access or use is difficult.…”
Section: Introductionmentioning
confidence: 99%
“…Diffusion is to adjust the pixel value of the image, cover the statistical properties of plain-image into the cipher-image, and implement the even distribution of pixels. A wealth of image encryption algorithms (IEAs) has recently been designed based on numerous technologies, such as substitution box [8][9][10][11], Josephus traversal [12,13], hash functions [14][15][16][17][18], DNA sequence operation [19][20][21], fractal theory [22], compression sensing [23,24], deep learning [25,26] and chaos theory [27][28][29][30][31][32]. Among those different tools, the IEA using chaos theory has been proved their enormous achievement due to the suitable properties of chaotic system (CS) for cryptography, such as the pseudo-randomness of dynamic systems, the non-periodicity of motion trajectories and the sensitivity to initial conditions.…”
Section: Introductionmentioning
confidence: 99%
“…Zhu et al [33] developed a new robust S-box, forming a high secure image encryption algorithm. Haider et al [34] proposed a novel cryptographic system, utilizing elliptic curves to increase a higher level of both security and computational efficiency. Additionally, researchers have also suggested various methods to construct S-boxes [35][36][37].…”
Section: Introductionmentioning
confidence: 99%