2023
DOI: 10.1007/s00500-023-07818-5
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption and watermarking in ACO-OFDM-VLC system employing novel memristive hyperchaotic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 75 publications
0
3
0
Order By: Relevance
“…A relatively bigger value of PSNR shows that the decrypted image has more resemblance to the original images. Moreover, comparison has also been carried out with [51], [52]. The results of the suggested work are better than [51].…”
Section: Other Attacks a Image Rotation Attack Analysismentioning
confidence: 98%
See 1 more Smart Citation
“…A relatively bigger value of PSNR shows that the decrypted image has more resemblance to the original images. Moreover, comparison has also been carried out with [51], [52]. The results of the suggested work are better than [51].…”
Section: Other Attacks a Image Rotation Attack Analysismentioning
confidence: 98%
“…Moreover, comparison has also been carried out with [51], [52]. The results of the suggested work are better than [51].…”
Section: Other Attacks a Image Rotation Attack Analysismentioning
confidence: 98%
“…Additionally, many synchronization schemes for memristive system have been studied, such as finite-time quantized synchronization method was studied in [14], UDE-based complete synchronization and antisynchronization method was proposed in [15], switching SMC combina tion synchronization and parameter identification method was considered in [16], finite-time H ∞ synchronization method was described in [17], adaptive fuzzy-impulsive synchronization method was focused in [18], active projective synchronization method was described in [19], passive-constrained synchronization control method was given in [20], inverse matrix projective difference synchronization method and its application were investigated in [21], and other synchronization control schemes were described in [22][23][24][25][26]. An image encryption method employing memristive map was introduced in [27]. Adaptive symmetry control in security systems was realized in [28].…”
Section: Introductionmentioning
confidence: 99%