2018
DOI: 10.1155/2018/3962821
|View full text |Cite
|
Sign up to set email alerts
|

Applied Cryptography and Noise Resistant Data Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…To reduce time complexity, images can be encrypted using chaos and transformation techniques such as Discrete Cosine transform (DCT) and DWT [19][20][21][22][23][24][25][26][27][28]. In the past few years, chaos has played a vital role in image encryption due to its some unique features such as sensitivity in initial conditions, unpredictability, pseudo randomness, ergodicity, and non-deterministic behavior [29][30][31][32][33][34].…”
Section: Plos Onementioning
confidence: 99%
See 1 more Smart Citation
“…To reduce time complexity, images can be encrypted using chaos and transformation techniques such as Discrete Cosine transform (DCT) and DWT [19][20][21][22][23][24][25][26][27][28]. In the past few years, chaos has played a vital role in image encryption due to its some unique features such as sensitivity in initial conditions, unpredictability, pseudo randomness, ergodicity, and non-deterministic behavior [29][30][31][32][33][34].…”
Section: Plos Onementioning
confidence: 99%
“…More randomness in an image results in a higher value of entropy. This relation is shown in Eq (21):…”
Section: Entropymentioning
confidence: 99%
“…One advantage of EAs is their efficiency in terms of computation time. However, insufficient encryption, as evidenced by patterns visible even after encryption, indicates a flaw in the EA [7,8]. For proper concealment and a sufficient level of encryption of textual data, conventional Data Encryption Standard (DES) and Advanced Encryption Standard (AES) are well-known techniques [9,10].…”
Section: Introductionmentioning
confidence: 99%
“…Chaotic systems are often used to generate random key streams by selecting appropriate initial conditions and state variables, which are also known as key parameters or seeds and then encrypted images can be produced by employing the generated key streams [13]. A slight change in the seed values may cause completely different key streams and thus a significant difference can occur in the output image (encrypted This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.…”
Section: Introductionmentioning
confidence: 99%