2021
DOI: 10.1007/978-981-15-8711-5_1
|View full text |Cite
|
Sign up to set email alerts
|

Securing Medical Images via a Texture and Chaotic Key Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 54 publications
0
3
0
Order By: Relevance
“…The secret keyspace is the size of the total of all variables utilized in the cryptosystem. To avoid brute-force attacks, the secret keyspace should be greater than 2 100 [45]. For our proposed image cryptosystem, the secret keys are comprised of the initial values,𝑦 0 ,𝑧 0 , ν, ε , Ď„ and the encryption round T. Using the double-precision IEEE-754 standard, each initial value and control parameter of the Zaslavsky map will take10 15 .…”
Section: Keyspace and Key Sensitivitymentioning
confidence: 99%
“…The secret keyspace is the size of the total of all variables utilized in the cryptosystem. To avoid brute-force attacks, the secret keyspace should be greater than 2 100 [45]. For our proposed image cryptosystem, the secret keys are comprised of the initial values,𝑦 0 ,𝑧 0 , ν, ε , Ď„ and the encryption round T. Using the double-precision IEEE-754 standard, each initial value and control parameter of the Zaslavsky map will take10 15 .…”
Section: Keyspace and Key Sensitivitymentioning
confidence: 99%
“…In the proposed approach, the key length used was 2 128 is quite enough for security. Since the efficient key space should be larger than 2 100 [25]. Therefore, the proposed approach can avoid attacks of the brute-force.…”
Section: A Sizes Of Block and Lengths Of Keymentioning
confidence: 99%
“…A robust encryption technique should have a large enough keyspace in order to overcome brute-force attacks [22]. Keyspace should be larger than 2 100 to avoid brute-force attacks [23]. The secret keys are made up of three parts in the suggested approach: a master key, a Chebyshev map, and a logistic map.…”
Section: Keyspace and Key Sensitivitymentioning
confidence: 99%