2023
DOI: 10.1109/access.2022.3233321
|View full text |Cite
|
Sign up to set email alerts
|

Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution

Abstract: With the emergence of new information technology fields and various usages of internet applications, securing massive amounts and multiple varieties of multimedia data has become a significant challenge. Hence, it is essential to investigate and develop new cryptographic algorithms to ensure the protection and privacy of multimedia data at rest and during transmission through the communication channel while attempting to overcome the limitations of traditional cryptographic methods. This paper suggests a novel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 38 publications
0
4
0
Order By: Relevance
“…The random behavior of the chaotic maps (logistic map and tent map) used in the proposed system has been validated by the National Institute of Standards and Technology (NIST) test. The NIST randomness test has 15 statistical tests with every test having a p‐ value (randomness probability) 31 . Therefore, NIST analysis has been considered for testing the randomness of the chaotic sequences generated by the logistic map and tent map shown in Tables 2 and 3.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The random behavior of the chaotic maps (logistic map and tent map) used in the proposed system has been validated by the National Institute of Standards and Technology (NIST) test. The NIST randomness test has 15 statistical tests with every test having a p‐ value (randomness probability) 31 . Therefore, NIST analysis has been considered for testing the randomness of the chaotic sequences generated by the logistic map and tent map shown in Tables 2 and 3.…”
Section: Resultsmentioning
confidence: 99%
“…The NIST randomness test has 15 statistical tests with every test having a p-value (randomness probability). 31 Therefore, NIST analysis has been considered for testing the randomness of the chaotic sequences generated by the logistic map and tent map shown in Tables 2 and 3.…”
Section: National Institute Of Standards and Technology (Nist) Analysismentioning
confidence: 99%
“…Consequently, image encryption research utilizing new technologies and methods has been increasingly attracting attention from researchers due to various reasons, such as privacy protection, commercial security, and military security [ 4 ]. In the past few years, to offer more efficient and secure protection for image data, lots of new image encryption algorithms or schemes have been continuously suggested [ 5 , 6 , 7 , 8 , 9 , 10 ]. For these newly proposed image encryption algorithms or schemes, this paper will collectively refer to them as encryption schemes hereafter.…”
Section: Introductionmentioning
confidence: 99%
“…Understanding self-awareness and self-adaptive functions is the cornerstone of modeling, designing, and engineering future systems. The self-awareness concept has been applied in many disciplines, such as computing systems [6], artificial neural networks [5], Internet of Things networks [7], and image security [8].…”
Section: Introductionmentioning
confidence: 99%