2023
DOI: 10.1016/j.aej.2022.10.066
|View full text |Cite
|
Sign up to set email alerts
|

IWT and RSA based asymmetric image encryption algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…NPCR, or Number of Pixels Changes Rate, measures the percentage of pixels with altered values for the original and encrypted image. 34,35 The higher the NPCR, the lesser the original image retained in the encrypted image. The mathematical equation for NPCR is shown in Equation ( 1) and is represented as a percentage, with 100% being no pixels with the same values.…”
Section: Differential Attack Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…NPCR, or Number of Pixels Changes Rate, measures the percentage of pixels with altered values for the original and encrypted image. 34,35 The higher the NPCR, the lesser the original image retained in the encrypted image. The mathematical equation for NPCR is shown in Equation ( 1) and is represented as a percentage, with 100% being no pixels with the same values.…”
Section: Differential Attack Analysismentioning
confidence: 99%
“…NPCR, or Number of Pixels Changes Rate, measures the percentage of pixels with altered values for the original and encrypted image 34,35 . The higher the NPCR, the lesser the original image retained in the encrypted image.…”
Section: Experimental Analysismentioning
confidence: 99%
“…The utility of the RSA encryption framework extends to a wide range of domains. For example, it has essential applications in the field of image cryptography, as demonstrated by the documents [2,5,12]. Furthermore, it plays a crucial role in protecting the confidentiality of medical records, a key issue in contemporary medical informatics [27].…”
Section: Rsa Encryption Algorithmmentioning
confidence: 99%
“…Calculate ๐‘‘ which is the private exponent, such that ๐‘’ ร— ๐‘‘ = 1 ๐‘š๐‘œ๐‘‘ โˆ…(๐‘›), where ๐‘š๐‘œ๐‘‘ symbolizes to the modulus operation or the reminder after division. Hence, (๐‘›, ๐‘’) represents the public encryption key, while (๐‘›, ๐‘‘) represents the private decryption key [18].…”
Section: Select Two Large Prime Integer Numbers ๐‘mentioning
confidence: 99%