2021
DOI: 10.1080/09500340.2021.1900440
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption based on adversarial neural cryptography and SHA controlled chaos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 37 publications
0
12
0
Order By: Relevance
“…Kolosnjaji et al [17] used CNNs and RNNs to identify malware. The list of call sequences to the API kernel is converted into binary vectors using one-hot encoding.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Kolosnjaji et al [17] used CNNs and RNNs to identify malware. The list of call sequences to the API kernel is converted into binary vectors using one-hot encoding.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This encryption process is depicted in Figure 4 . Wu et al ( 2021 ) introduced an image encryption method based on adversarial neural cryptography (ANC) and SHA control chaos. This approach obtains an intermediate image similar to noise by training a GAN, and subsequently performs an XOR operation based on the Logistic mapping on the intermediate image to generate the final ciphertext.…”
Section: Related Researchmentioning
confidence: 99%
“…To highlight the ResNet-CM model has better medical image encryption effect than other models, we carried out comparative experiments between ResNet-CM model and Zhang et al ( 2012 ), Ding et al ( 2020 ), Yang et al ( 2020 ), Hua et al ( 2021 ), Wu et al ( 2021 ), Wang et al ( 2022 ), and Zhu et al ( 2022 ). To better measure the medical image encryption effect of these models, the horizontal correlation coefficient and information entropy of these models on encrypted images are shown in Table 4 .…”
Section: Experimentationmentioning
confidence: 99%
“…The parties generate their own TPMs using common parameters and starting random weight values for the TPMs in the standard neural cryptography [16] . After that, they create a random input vector and compute their own output values by feeding the TPM with the produced common input.…”
Section: Introductionmentioning
confidence: 99%