2020
DOI: 10.1109/tcsvt.2019.2925522
|View full text |Cite
|
Sign up to set email alerts
|

The Design of a Novel Multiple-Parameter Fractional Number-Theoretic Transform and Its Application to Image Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 61 publications
0
4
0
Order By: Relevance
“…Similar to the design logic proposed in the study, other design studies have highlighted the key generator [52][53][54] and used best practices of modern cryptology science [55][56][57]. Quantum systems [58,59], fractional systems [60][61][62], and medical encryption algorithms [63][64][65], which have attracted attention recently, are other current topics related to design proposals.…”
Section: Analysis Of Proposed Architecturementioning
confidence: 88%
See 1 more Smart Citation
“…Similar to the design logic proposed in the study, other design studies have highlighted the key generator [52][53][54] and used best practices of modern cryptology science [55][56][57]. Quantum systems [58,59], fractional systems [60][61][62], and medical encryption algorithms [63][64][65], which have attracted attention recently, are other current topics related to design proposals.…”
Section: Analysis Of Proposed Architecturementioning
confidence: 88%
“…science [55][56][57]. Quantum systems [58,59], fractional systems [60][61][62], and medical encryption algorithms [63][64][65], which have attracted attention recently, are other current topics related to design proposals. The encrypted images obtained for the sample test images in Figure 8 using the proposed algorithm are given in Figure 9.…”
Section: Discussionmentioning
confidence: 99%
“…The histogram for an image depicts how pixel values are spread throughout it. For a simple image, the histogram should exhibit a non-uniform pattern, showing variations in pixel intensity levels [9,19,20].…”
Section: Statical Attack Analysismentioning
confidence: 99%
“…To analyze the robustness of the suggested image encryption method, we use the cutting attack. The MSE and PSNR between the simple image and the decrypted image are essential for assessing the decrypted image, and they are calculated as ( 6) and ( 7) [8,19,24].…”
Section: Robustness Analysismentioning
confidence: 99%