2016
DOI: 10.1016/j.optlaseng.2016.04.023
|View full text |Cite
|
Sign up to set email alerts
|

Novel permutation measures for image encryption algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(13 citation statements)
references
References 33 publications
0
13
0
Order By: Relevance
“…To recover the permutation position array X , we select a special color plain image P = [1,2,3,4,5,6,7,8,9,10,11,12] and obtain the corresponding cipher image C = [240, 44,45,220,207,217,89 , 211, 132, 239, 53, 58] by using Pak's encryption machine. Then we can obtain its intermediary ciphertext array C according to Equation (5) as C = [211, 132, 239, 53, 58, 240, 44, 45, 220, 207, 217, 89].…”
Section: Examples Of the Improved Cryptanalysis Schemementioning
confidence: 99%
See 2 more Smart Citations
“…To recover the permutation position array X , we select a special color plain image P = [1,2,3,4,5,6,7,8,9,10,11,12] and obtain the corresponding cipher image C = [240, 44,45,220,207,217,89 , 211, 132, 239, 53, 58] by using Pak's encryption machine. Then we can obtain its intermediary ciphertext array C according to Equation (5) as C = [211, 132, 239, 53, 58, 240, 44, 45, 220, 207, 217, 89].…”
Section: Examples Of the Improved Cryptanalysis Schemementioning
confidence: 99%
“…Then we can obtain its intermediary ciphertext array C according to Equation (5) as C = [211, 132, 239, 53, 58, 240, 44, 45, 220, 207, 217, 89]. Then we can obtain the permutated pixel array P from D by using Equation 4, that is, P = [10,8,2,3,9,11,4,5,12,6,7,1]. By comparing P and P , the permutation array X is recovered as X = [10,8,2,3,9,11,4,5,12,6,7,1].…”
Section: Examples Of the Improved Cryptanalysis Schemementioning
confidence: 99%
See 1 more Smart Citation
“…Hence the cryptosystems based on chaotic systems mainly suffer from key size requirements [Alvarez & Li, 2006, Kelber & Schwarz, 2007, Rhouma et al, 2010, Solak et al, 2010, Ozkaynak and Ozer, 2016. Despite above mentioned drawback of having a reduced key space, the chaotic systems have been a preferred choice [Patidar et al, 2011, Wang and Xu, 2015, Wu et al, 2016, Abd-El-Hafiz et al, 2016, Farajallah et al, 2016 for the image encryption systems due to their features: ergodicity, mixing property, sensitivity to initial conditions/system parameters, etc. having close resemblance with the ideal cryptographic properties: confusion, diffusion, balance, avalanche properties, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Initial values and system parameters of the chaotic system were calculated first. Abd-El-Hafiz et al 20 proposed two measures for the evaluation permutation skills. Two parameters were proposed in the program.…”
Section: Introductionmentioning
confidence: 99%