2020
DOI: 10.1007/s11042-020-09551-9
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric keys image encryption and decryption using 3D chaotic maps with DNA encoding technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 45 publications
(19 citation statements)
references
References 17 publications
0
19
0
Order By: Relevance
“…In their proposed approach, they have used the rand function instead of a logistic map and the security of the proposed algorithm is evaluated by testing the impact of several attacks on it. [ 40 ] proposed another method which involves a 3D chaotic logistic map as well as DNA encoding and it is used for confusion and diffusion of image pixels. In addition, they [ 40 ] have used three symmetric keys at the initial condition of the logistic map, which enables the algorithm to provide more security.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In their proposed approach, they have used the rand function instead of a logistic map and the security of the proposed algorithm is evaluated by testing the impact of several attacks on it. [ 40 ] proposed another method which involves a 3D chaotic logistic map as well as DNA encoding and it is used for confusion and diffusion of image pixels. In addition, they [ 40 ] have used three symmetric keys at the initial condition of the logistic map, which enables the algorithm to provide more security.…”
Section: Related Workmentioning
confidence: 99%
“…[ 40 ] proposed another method which involves a 3D chaotic logistic map as well as DNA encoding and it is used for confusion and diffusion of image pixels. In addition, they [ 40 ] have used three symmetric keys at the initial condition of the logistic map, which enables the algorithm to provide more security. The 32-bit ASCII keys are used in symmetric keys, Chebyshev chaotic key, and prime key.…”
Section: Related Workmentioning
confidence: 99%
“…Almost, the strength of the encryption algorithm comes from the power of the key generation, so the [13] focused on the improvement of the PRNG of the encryption algorithm when XOR function as an aggregator for three four-wing memristive hyperchaotic systems. The proposed method in [14] generates initial conditions using 3D logistic maps, thus, these conditions are used to scramble the image, then the encryption key is generated by another 3D logistic map, and the XORing operation is done after converting the image into DNA representation. A combination of quasigroups and the chaotic standard map has been proposed in [15] to overcome the shortage of key-space, the algorithm achieved both substitution procedures by quasigroup of order 256, and the permutation procedure is done by the standard chaotic map.…”
Section: Related Workmentioning
confidence: 99%
“…An extended version of the 1D logistic map with complex chaotic behaviour and more initial and control parameters could be a better choice to make it at the core of PRNG, this map was presented in [14,19], described as follows:…”
Section: D Generalized Logistic Map (3d-glm)mentioning
confidence: 99%
“…A novel encryption algorithm that depended on a new S-Box and logistic-sine system (LSS) has been proposed in [22]. [23] used a 3D chaotic logistic map with DNA encoding to suggest an image encryption approach. A new form of encryption was proposed by [24] based on keys derived from DNA and plaintext image.…”
Section: Introductionmentioning
confidence: 99%