2019
DOI: 10.1155/2019/9524080
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption Algorithm Based on the H-Fractal and Dynamic Self-Invertible Matrix

Abstract: In this paper, an image encryption algorithm based on the H-fractal and dynamic self-invertible matrix is proposed. The H-fractal diffusion encryption method is firstly used in this encryption algorithm. This method crosses the pixels at both ends of the H-fractal, and it can enrich the means of pixel diffusion. The encryption algorithm we propose uses the Lorenz hyperchaotic system to generate pseudorandom sequences for pixel location scrambling and self-invertible matrix construction to scramble and diffuse … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…The performance of the EIS-DHT technique is investigated using a benchmark USC-SIPI image dataset [23]. It contains a numerous collection of digital images with varying sizes of 256 * 256, 512 * 512, and 1024 * 1024 pixels.…”
Section: Performance Validationmentioning
confidence: 99%
“…The performance of the EIS-DHT technique is investigated using a benchmark USC-SIPI image dataset [23]. It contains a numerous collection of digital images with varying sizes of 256 * 256, 512 * 512, and 1024 * 1024 pixels.…”
Section: Performance Validationmentioning
confidence: 99%
“…The NPCR is used to measure the percentage of the number of pixels changed in ciphertext after making a slight change (one pixel change) in plaintext. Therefore, the theoretical greatest upper-bound of the NPCR is 100% [15]. The following steps are involved in the NPCR analysis.…”
Section: Differential Measure (Npcr)mentioning
confidence: 99%
“…However, such solutions have not completely met the basic criteria of data security and time objectives through respective cryptography techniques. Thus, the quicker and effective image cryptography has become a popular research field [15].…”
Section: Introductionmentioning
confidence: 99%
“…The most notable example of image security is image encryption. Image encryption methods use several techniques, such as symmetric key encryption or public key encryption [1], [2]. In particular, image encryption methods are dependent on changes to pixel arrangement, called diffusion and confusion, which depend on changing the value of pixels.…”
Section: Introductionmentioning
confidence: 99%