2022
DOI: 10.1007/s42835-022-01157-5
|View full text |Cite
|
Sign up to set email alerts
|

Color Image Encryption Algorithm Based on Four-Dimensional Multi-stable Hyper Chaotic System and DNA Strand Displacement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 53 publications
0
7
0
Order By: Relevance
“…The concentration of S n is provided to each node corresponding to the hidden layer and activated by activation function (1), i.e., the proposed new activation function. Through reaction (14), the concentration of S n is mapped to Z n , which serves as the output of the hidden layer. In the output layer, the input values are represented by the concentration of Z n .…”
Section: Pccp Papermentioning
confidence: 99%
See 2 more Smart Citations
“…The concentration of S n is provided to each node corresponding to the hidden layer and activated by activation function (1), i.e., the proposed new activation function. Through reaction (14), the concentration of S n is mapped to Z n , which serves as the output of the hidden layer. In the output layer, the input values are represented by the concentration of Z n .…”
Section: Pccp Papermentioning
confidence: 99%
“…It can be achieved at room temperature. Currently, DNA molecule displacement reactions have been widely used in fields such as logic computation, [3][4][5][6][7] biosensors, [8][9][10] molecular robotics, [11][12][13] information encryption, [14][15][16][17] and medical diagnosis. [18][19][20][21] The emergence of complex biomolecular circuits facilitated the survival of cells with intelligent behavior, predating the evolution of neural brains.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As an important part of the cryptosystem, the key should be highly sensitive, that is, the change of any bit of the key will have a great impact on the encryption result [37]. Since most of the keys in this scheme are generated by the hash function, and the hash value greatly affects the key, the plaintext hash value is changed one bit to evaluate the key sensitivity of this scheme.…”
Section: Key Sensitivity Analysismentioning
confidence: 99%
“…The associate editor coordinating the review of this manuscript and approving it for publication was Gustavo Callico . them, resulting in growth in the branch of image encryption [2], [3], [4], [5], [6], [7], [8], [9].…”
mentioning
confidence: 99%