2018
DOI: 10.1007/s11042-018-6516-1
|View full text |Cite
|
Sign up to set email alerts
|

Block mode image encryption technique using two-fold operations based on chaos, MD5 and DNA rules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
23
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

3
6

Authors

Journals

citations
Cited by 35 publications
(25 citation statements)
references
References 38 publications
2
23
0
Order By: Relevance
“…The application of machine learning algorithm has gained popularity in different fields of computing [43][44][45][46][47][48]. The range of scholars motivated to investigate prognosis and diagnosis using machine learning methods is progressively increasing.…”
Section: Related Workmentioning
confidence: 99%
“…The application of machine learning algorithm has gained popularity in different fields of computing [43][44][45][46][47][48]. The range of scholars motivated to investigate prognosis and diagnosis using machine learning methods is progressively increasing.…”
Section: Related Workmentioning
confidence: 99%
“…Among them, the researchers proposed a new plan, and the confusion and coding techniques are completely different due to the method of sequencing the block code of the jamming used at the bit level after stirring and DNA coding. In this procedure, the MD5 hash function is applied to formulate hash digestion to modify the initial conditions for all used messy maps [23]. The researchers proposed a new algorithm referring to Robust Integrity Verification Algorithm (RIVA).…”
Section: Previous Workmentioning
confidence: 99%
“…The plain I and encrypted image E with L intensities are divided into non-overlapped k blocks where E 1 , • • • , E k with every blocks has T number of pixels. We have randomly selected K number of blocks and used Equation (27) to compute the mean of local entropy of k blocks. In the simulation, K = 32 and T = 1936 are used.…”
Section: Information Entropy Analysismentioning
confidence: 99%
“…The DNA sequence based algorithms have properties of parallelism and info density like DNA molecules [20]- [26]. The researchers have made a clear dent in improving existing cryptosystems in terms of their robustness to text-attacks by using DNA sequencing [21], [23], [27]- [30]. The DNA based schemes being new and less mature has seen cracking due to low dimensionality of chaotic maps causing periodicity [24], [32], [33].…”
Section: Introductionmentioning
confidence: 99%