2022
DOI: 10.1109/tcsi.2022.3172116
|View full text |Cite
|
Sign up to set email alerts
|

Spiral-Transform-Based Fractal Sorting Matrix for Chaotic Image Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 48 publications
(8 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…In digital image encryption, spiral transformation is often used to permute the image [13,14]. Subramanyan et al used the conventional spiral transformation to permute the plain image, which can scan the elements of the matrix from the left corner to the center in a clockwise manner [15].…”
Section: Related Workmentioning
confidence: 99%
“…In digital image encryption, spiral transformation is often used to permute the image [13,14]. Subramanyan et al used the conventional spiral transformation to permute the plain image, which can scan the elements of the matrix from the left corner to the center in a clockwise manner [15].…”
Section: Related Workmentioning
confidence: 99%
“…That is, the plain image is processed and converted into a noise-like cipher image. Many scholars propose different image encryption schemes based on quantum computation, [4,5] chaos theory, [6][7][8] fractal sorting matrix, [9][10][11] DNA coding, [12,13] fractal control theory, [14][15][16] and other technologies. [17][18][19] Specifically, this type of image encryption algorithms is mainly composed of scrambling and diffusion, which encrypt the image by changing pixel position and pixel value, respectively.…”
Section: Introductionmentioning
confidence: 99%
“…[ 8,9 ] Digital encryption relies on specific algorithms to resist cropping attack and noise attacks, which plays a pivotal role in operating systems for maintaining communication privacy and network security. [ 10–14 ] Compared with digital encryption, physical encryption has the advantage of crypticity and can be realized via diverse methods, [ 15,16 ] which is widely applied in currency anti‐counterfeiting, confidential work, information transfer, etc. With the continuous development of physical encryption technology, various methods such as security codes, holographic anti‐counterfeiting, fluorescence recognition, etc., are invented.…”
Section: Introductionmentioning
confidence: 99%