2021
DOI: 10.1007/s11042-021-11051-3
|View full text |Cite
|
Sign up to set email alerts
|

Remodeling randomness prioritization to boost-up security of RGB image encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 37 publications
(7 citation statements)
references
References 58 publications
0
5
0
Order By: Relevance
“…The proposed encryption technique is applied to the RGB layer and transformation (1,6) is also applied to the individually formed datasets. This helps in producing different cipher images for each small change in the original secret image (7) . This RGB layer extraction supports to build a system to sustain the brute force attacks.…”
Section: Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed encryption technique is applied to the RGB layer and transformation (1,6) is also applied to the individually formed datasets. This helps in producing different cipher images for each small change in the original secret image (7) . This RGB layer extraction supports to build a system to sustain the brute force attacks.…”
Section: Cryptographymentioning
confidence: 99%
“…The limited computation, memory and communication capabilities make the chaotic system not suitable for larger size images. In color image, every pixel consists of RGB color components that determine the intensity of the color in the image (1,6,7) . There are a variety of encryption schemes available and it is essential to identify the appropriate technique to be implemented.…”
Section: Introductionmentioning
confidence: 99%
“…Other CAPTCHA schemes used puzzle-based manipulation, which involved puzzles, such as Cascading style sheet, JQuery, and HTML (Ali & Karim, 2014) or any complex image-based authentication (Al-Roithy & Gutub, 2021). The puzzle-based CAPTCHA showed authentication testing, but requested puzzle-based widget to provide support for installing web information.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Steganography has become one the most popular methods for information hiding because of its simplicity and easy communication through already existing technology and communication channels like IP cameras, smartphones, and social media apps like WeChat, WhatsApp, Telegram, Signal, etc. without any extra cost of additional infrastructures like private key sharing or private communication channels, etc. There have been various works which have not included deep learning in their work, however, have contributed in the field of watermarking and steganography (Hassaballah et al, 2020;Gutub and Al-Ghamdi, 2020;Gutub and Al-Roithy, 2021;Hassan and Gutub, 2021;Al-Roithy and Gutub, 2021;AlKhodaidi and Gutub, 2021;Hameed, Abdel-Aleem and Hassaballah, 2022;Gutub, 2022aGutub, , 2022b.…”
Section: Introductionmentioning
confidence: 99%