2022
DOI: 10.1016/j.chaos.2022.112628
|View full text |Cite
|
Sign up to set email alerts
|

PixAdapt: A novel approach to adaptive image encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…This method is easily implementable and highly adaptable, effectively meeting the evolving security needs. Therefore, the application and research of image encryption in information security are gaining heightened importance [6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…This method is easily implementable and highly adaptable, effectively meeting the evolving security needs. Therefore, the application and research of image encryption in information security are gaining heightened importance [6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, in order to better fulfill the different tasks of encryption, an adaptive disambiguation method that combines the target image information to directly disambiguate the image pixels is proposed in [27], which employs adaptive disambiguation to change the image pixel values and effectively disambiguates the pixel positions. In [28], in order to consider the representative features of the image, a novel adaptive image encryption algorithm, PixAdapt, is proposed, which adaptively changes the parameters of the chaotic system, thereby optimizing theunified average changing intensity(UACI)value of the image. The above adaptive mechanism cannot solve the problem of rationally adjusting the encryption resources when they are limited.…”
Section: Introductionmentioning
confidence: 99%
“…Their algorithm first utilized the wavelet transform to sparsify the input image, and then performed subsequent encryption processing using binary patterns and compressive sensing. In [17], an image encryption algorithm relying on several chaotic maps and optimization algorithms was suggested. This algorithm employed optimization algorithms to modify encryption parameters and ultimately produced the final ciphertext image by performing confusion and diffusion operations.…”
Section: Introductionmentioning
confidence: 99%