2020
DOI: 10.1109/access.2020.2986831
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption Based on Hash Table Scrambling and DNA Substitution

Abstract: This paper proposes an image encryption algorithm based on hash table structure scrambling and DNA substitution. The algorithm uses the classical 'scrambling-diffusion' process, and the pseudo-random sequence used in each process is generated by the hyper-chaotic Chen system. Firstly, in the process of scrambling, two sequences with no repeated values are constructed by using the closed hash method in the hash table structure for chaotic sequences, and the plain image is scrambled twice according to the two se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 33 publications
(17 citation statements)
references
References 29 publications
0
16
0
1
Order By: Relevance
“…A good encryption algorithm should significantly destroy the correlation of adjacent pixels [45]. The correlation coefficient is calculated as follows in (45), (46), and 47:…”
Section: Correlation Analysismentioning
confidence: 99%
“…A good encryption algorithm should significantly destroy the correlation of adjacent pixels [45]. The correlation coefficient is calculated as follows in (45), (46), and 47:…”
Section: Correlation Analysismentioning
confidence: 99%
“…For all scrambling techniques, they used the confusion stage. Wang et al [36] introduced an image encryption technique where they exploited Hash table structure scramble and DNA sequence operations. However, confusion techniques using pixel, bit, or block scrambling are time consuming.…”
Section: Background Studymentioning
confidence: 99%
“…This system was designed for four sections: pixel-level diffusion, pixel-level permutation, DNA level diffusion, and the second permutation. An image encryption technique depending on the framework of the hash table scrambling and DNA replacement is suggested in [43]. The algorithm uses the classic process of 'scramblingdiffusion', and the hyper-chaotic Chen.…”
Section: Chaotic Image Cryptography Systems 2020mentioning
confidence: 99%
“…Examples of these techniques are: a. DNA and Chaotic Map: We note that these studies [22], [23], [25], [29], [30], [42], [43], and [46] merged the chaotic map and DNA. The combination measures were relatively better due to its dependence on the randomness of chaotic sequences and on the scrambling of values using DNA codes, which provided a suitable behaviour to isolate the values and change them in a simple way to strengthen its randomness.…”
Section: Fig 3 the Basic Chaotic Map Typesmentioning
confidence: 99%
See 1 more Smart Citation