2014
DOI: 10.1007/s11042-013-1828-7
|View full text |Cite
|
Sign up to set email alerts
|

Selective encryption for gray images based on chaos and DNA complementary rules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
72
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 125 publications
(72 citation statements)
references
References 24 publications
0
72
0
Order By: Relevance
“…The results are shown in Table 9. This shows that our algorithm is faster than most of the algorithms in [39,40,43,44], but it is just slightly slower than that in [40].…”
Section: Computational Speed Analysismentioning
confidence: 78%
“…The results are shown in Table 9. This shows that our algorithm is faster than most of the algorithms in [39,40,43,44], but it is just slightly slower than that in [40].…”
Section: Computational Speed Analysismentioning
confidence: 78%
“…13 (A) and (G), respectively, bond with complement (T) and (C), and vice versa. 00, 01, 10, and 11 are represented as A, C, G, and T, respectively.…”
Section: Deoxyribonucleic Acid Operationsmentioning
confidence: 99%
“…[11][12][13][14][15] Zhen et al 12 presented an image encryption scheme based on chaotic sequence, DNA encoding, and entropy. Rehman et al 13 proposed a method that was based on chaos and DNA complementary rules for gray images. The most significant and least significant parts of each block were encoded with different methods.…”
Section: Introductionmentioning
confidence: 99%
“…There has also been substantial in-depthr esearch into chaotic logistic map-based image-encryption methods, which have achieved significant results. [8][9][10][11][12][13][14][15] In addition, Norouzi andM irzakuchaki presented an ew approach to image encryption based on biological DNA sequenceo perations and the cellular neural network (CNN). [16] The three operations (bit substitution, key stream generation process, and diffusion process) used in the method can be easily implemented in ac omputationally efficient manner to achieveh igh security and high sensitivity with respectt ot he variations in the encryption key.T oe nsure the security of the proposed algorithm,a256 bit encryption key was used to produce the initial conditions of the chaotic system of the CNN and increasethe computational complexity of the algorithm.…”
Section: Related Workmentioning
confidence: 99%