2017
DOI: 10.1016/j.optlaseng.2016.10.006
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using a synchronous permutation-diffusion technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
103
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 215 publications
(104 citation statements)
references
References 33 publications
0
103
0
1
Order By: Relevance
“…In order to analyze whether the scheme in this paper could resist differential attacks, we encrypted the Lena image using our algorithm and the scheme proposed in [11,[13][14][15][16]. We performed a 1 bit change on the original plaintext image and tested the impact on the corresponding encrypted image by calculating the values of NPCR and UACI.…”
Section: Differential Attack Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…In order to analyze whether the scheme in this paper could resist differential attacks, we encrypted the Lena image using our algorithm and the scheme proposed in [11,[13][14][15][16]. We performed a 1 bit change on the original plaintext image and tested the impact on the corresponding encrypted image by calculating the values of NPCR and UACI.…”
Section: Differential Attack Analysismentioning
confidence: 99%
“…It can be seen from the table that the proposed algorithm's NPCR was 99.63%, and its UACI was 33.45%. Compared with [11,[13][14][15][16], the proposed algorithm was more resistant to differential attacks. From the overall analysis, the proposed algorithm performed better than the baseline.…”
Section: Differential Attack Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…DNA encoding with permutation and chaos techniques has been used in efficient image encryption [11], [15], [30]. Both substitution and permutation components have been found in [11] to encrypt images.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Image data in [15] is transferred into a DNA sequence based on random encoding, then a self-adaptive permutation is used to generate the final cipher image. In [30], images are transformed into one-dimensional sequence, then pixels are shuffled using chaotic and DNA based permutation, afterward a DNA-diffusion process is used to generate the cipher. Efficiency and simplicity of DNA and Elliptic Curve (EC) cryptography are combined with [31].…”
Section: Literature Reviewmentioning
confidence: 99%