2020
DOI: 10.1007/s11277-020-07680-w
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
25
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 58 publications
(25 citation statements)
references
References 48 publications
0
25
0
Order By: Relevance
“…In [150], Shafique et al addressed the issues of pixel hiding of the original image with low textured regions and increased computational time which are often present in traditional image encryption techniques. To overcome these issues the author has proposed dynamic substitution S-box encryption in a discrete wavelet transform (DWT).…”
Section: Image Encryption In Transform Domainmentioning
confidence: 99%
“…In [150], Shafique et al addressed the issues of pixel hiding of the original image with low textured regions and increased computational time which are often present in traditional image encryption techniques. To overcome these issues the author has proposed dynamic substitution S-box encryption in a discrete wavelet transform (DWT).…”
Section: Image Encryption In Transform Domainmentioning
confidence: 99%
“…To gauge the performance of the proposed encryption algorithm, the following parameters are under consideration: The detail of such security parameters can be seen in [65][66][67]. Table 1 shows the statistical value of the security parameters calculated for the evaluation of the proposed cryptosystem for medical images.…”
Section: Proposed Encryption Scheme Evaluationmentioning
confidence: 99%
“…From the last few decades, several chaos-based image encryption schemes have been suggested; however, numerous of them have been proven unsecured because of lower keyspace and computational difficulties [45]. In accordance with the encryption schemes presented in the literature [29], [46]- [48], a secure encryption scheme must hold both diffusion and permutation mechanisms. But unfortunately, several existing schemes do not fulfill the above mentioned [49], [50].…”
Section: Introductionmentioning
confidence: 99%