2020
DOI: 10.1109/access.2020.2974226
|View full text |Cite
|
Sign up to set email alerts
|

Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications

Abstract: The need for cybersecurity increases to protect the exchange of information for improving the data privacy. This paper presents an investigation of the encryption efficiency of the chaotic-based image block ciphering in the spatial and Fractional Fourier Transform (FrFT) domains. The main aim of this investigation is to examine the efficiency of different chaotic maps, while considering the parameters of the FrFT as additional keys for encryption and achieving reliable cybersecurity for robust image communicat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

4
4

Authors

Journals

citations
Cited by 59 publications
(40 citation statements)
references
References 37 publications
0
37
0
Order By: Relevance
“…After a detailed examination it turns out that this proposed technique is proven to be fairly practical and secure within the current security model [20]. The traditional methods of applying security to data used to be by encrypting data with techniques such as public key encryption, and symmetric key encryption [18] [21] [17,22] [23], yet they change data types which makes it difficult to use them in database applications for several operations in SQL such as queries [20]. But still, all these data are categorized as private assets, along with information extracted through queries, so they cannot be unprotected if traditional encryption techniques do not meet the desired measures.…”
Section: L-encdb Schemementioning
confidence: 99%
See 1 more Smart Citation
“…After a detailed examination it turns out that this proposed technique is proven to be fairly practical and secure within the current security model [20]. The traditional methods of applying security to data used to be by encrypting data with techniques such as public key encryption, and symmetric key encryption [18] [21] [17,22] [23], yet they change data types which makes it difficult to use them in database applications for several operations in SQL such as queries [20]. But still, all these data are categorized as private assets, along with information extracted through queries, so they cannot be unprotected if traditional encryption techniques do not meet the desired measures.…”
Section: L-encdb Schemementioning
confidence: 99%
“…Therefore, the protection of data became a needed condition in the field of CC privacy. To fulfill this approach, there has been a lot of techniques proposed to protect data, some of them involve encryption techniques [18], such as FHE, but it does not serve well in case of incremental data sets due to its large cypher text. There exist other techniques which their concept is basically about anonymizing data sets to produce a secure and privacy preserving solution for shared data on clouds.…”
Section: A Privacy Preserving Technique For Incremental Datasetsmentioning
confidence: 99%
“…x∈ PC m (x) (18) where the HEVC frame spatial domain is given by , PC m (x) denotes the expected phase congruency value, and the whole projected similarity among two HEVC frames is indicated to the S L (x). Table 6 demonstrates the FSIM findings amongst the enciphered and original HEVC frames.…”
Section: ) Fsim Ssim and Psnr Security Analysismentioning
confidence: 99%
“…In the ciphering procedure, the multimedia content is encrypted to be transformed from a comprehensible structure to an incomprehensible one [16]. Thus, after the cryptography procedure, the content of multimedia information becomes meaningless for opponents and invaders, and subsequently, it is preserved and secured [17], [18]. Several ciphering procedures have been introduced in earlier years, but most of these procedures have various constraints.…”
Section: Introductionmentioning
confidence: 99%
“…So, there is a high necessity to enhance the security of data during the transmission process. The information security concept is built upon three basic principles which are availability, integrity, and confidentiality [2]. Confidentiality is the guarantee of data secrecy to allow authorized and intended receivers only to understand the sensitive data.…”
Section: Introductionmentioning
confidence: 99%