2022
DOI: 10.1007/s11042-022-13625-1
|View full text |Cite
|
Sign up to set email alerts
|

Correction to: Image cryptosystem based on plain image correlation rate and selective chaotic maps

Abstract: The original publication of this article contains incorrect presentation of the first and second affiliations. The original article has been corrected.Publisher's note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…NPCR and UACI values between A1 and A2 are calculated using equations 9 to 11. The NPCR of about 100% and the UACI of about 33.33% [19] means that the two evaluated images are completely different from each other. In these equations, the encrypted image of the test image is called A1, and the encrypted image that is obtained by randomly changing the least significant bit in the (x, y) coordinates (Cameraman (x, y)) of the original image is called A2.…”
Section: Resistance To Differential Attacksmentioning
confidence: 92%
See 2 more Smart Citations
“…NPCR and UACI values between A1 and A2 are calculated using equations 9 to 11. The NPCR of about 100% and the UACI of about 33.33% [19] means that the two evaluated images are completely different from each other. In these equations, the encrypted image of the test image is called A1, and the encrypted image that is obtained by randomly changing the least significant bit in the (x, y) coordinates (Cameraman (x, y)) of the original image is called A2.…”
Section: Resistance To Differential Attacksmentioning
confidence: 92%
“…4.These results show that proposed method has a high sensitivity to security keys in both encryption and decryption process. Additionally, only a tiny difference of 10 −14 can result in significant changes in encryption/decryption results, which means the proposed algorithm has a large key space to defend the attackers deciphering [19].…”
Section: Key Sensitivitymentioning
confidence: 99%
See 1 more Smart Citation