2011 International Conference on High Performance Computing &Amp; Simulation 2011
DOI: 10.1109/hpcsim.2011.5999916
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using stream cipher algorithm with nonlinear filtering function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…They are called the LFSR secret key with period . The generated sequence (key stream) depends on both the initial state of the shift register and the feedback function [12].…”
Section: Pseudorandom Permutation IImentioning
confidence: 99%
See 2 more Smart Citations
“…They are called the LFSR secret key with period . The generated sequence (key stream) depends on both the initial state of the shift register and the feedback function [12].…”
Section: Pseudorandom Permutation IImentioning
confidence: 99%
“…It is computed between the encrypted and the original images. If the correlation coefficient equal to zero, then the encrypted image is completely different from the original image [12]. The following formula demonstrates the Correlation Coefficient (Cor):…”
Section: ) Correlation Coefficientmentioning
confidence: 99%
See 1 more Smart Citation
“…1 . The generated sequence (key stream) depends on both the initial state of the shift register and the feedback function [12].…”
Section: IIImentioning
confidence: 99%
“…Wide variety of encryption schemes are available as well as several branches of cryptography are also available like Multivariate cryptography, Symmetric key cryptography, Quantum cryptography, DNA cryptography, Steganography, Visual cryptography, etc. with a variety of features [6], [13].…”
Section: Introductionmentioning
confidence: 99%