2022
DOI: 10.1109/tcsvt.2021.3108767
|View full text |Cite
|
Sign up to set email alerts
|

Double Parameters Fractal Sorting Matrix and Its Application in Image Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 111 publications
(27 citation statements)
references
References 33 publications
0
26
0
1
Order By: Relevance
“…In Ref. [35,36], the fractal sorting matrix (FSM) is introduced to the scrambling process in an image encryption algorithm. Due to the application of FSM, the security and efficiency of the image encryption are both improved.…”
Section: Related Workmentioning
confidence: 99%
“…In Ref. [35,36], the fractal sorting matrix (FSM) is introduced to the scrambling process in an image encryption algorithm. Due to the application of FSM, the security and efficiency of the image encryption are both improved.…”
Section: Related Workmentioning
confidence: 99%
“…To sort out the issues of computation complexity and providing a high level of security to the digital data, significant research has been carried out in which some of them are based on frequency transformation, and chaotic systems based integrated with substitution boxes (Sboxes) [41][42][43][44][45][46][47][48][49].…”
Section: Related Workmentioning
confidence: 99%
“…( 20), and next three sequences CR,CG and CB are generated by the inverse BCPIV process, subsequently, three sequences R_2, G_2, B_2 are produced by Eqs. (21)(22)(23)(24)(25)(26), finally the three sequences obtained are recombined to obtain the color decrypted image.…”
Section: Decryption Algorithmmentioning
confidence: 99%
“…Wang et al [20] introduced an image encryption algorithm based on matrix semi-tensor product and composite key, designed a new permutation method and composite key generation approach, making the generated encrypted images more secure and effective. They also designed single-parameter fractal ordering matrices [21] and two-parameter fractal ordering matrices [22] for the encryption process, which improved the encryption speed and the security of the encrypted images. Khan et al [23] introduced an image cryptographic scheme based on a permutationdiffusion framework, which is more productive due to the use of predefined S-boxes, Chebyshev polynomials and fractal Tromino in the encryption process.…”
Section: Introductionmentioning
confidence: 99%