2021
DOI: 10.1007/s11082-021-02908-w
|View full text |Cite
|
Sign up to set email alerts
|

Unequal modulus decomposition and modified Gerchberg Saxton algorithm based asymmetric cryptosystem in Chirp-Z transform domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 61 publications
0
6
0
Order By: Relevance
“…Using a double floating point number with 64-bit precision, the key space is 2 2 2 , 53 7 371 100 = > ´which is much larger than 2100. Consequently, the security of the image encryption system is improved and the resistance to exhaustive attacks is enhanced [36][37][38][39][40][41].…”
Section: Keyspace Analysismentioning
confidence: 99%
“…Using a double floating point number with 64-bit precision, the key space is 2 2 2 , 53 7 371 100 = > ´which is much larger than 2100. Consequently, the security of the image encryption system is improved and the resistance to exhaustive attacks is enhanced [36][37][38][39][40][41].…”
Section: Keyspace Analysismentioning
confidence: 99%
“…The proposed algorithm is also tested against the known plaintext attack (KPA) [8], chosen plaintext attack (CPA) [9], and a special iterative attack [30]. Figure 11 presents the results for KPA and CPA when the grayscale 'Building' image is used as the original image.…”
Section: Plaintext and Special Iterative Attacksmentioning
confidence: 99%
“…Although these types of asymmetric cryptosystems can resist the known plaintext attack and the chosen plaintext attack, it has been found that they can be targeted by iterative cryptographic attacks [22,24]. The security of these cryptosystems was further enhanced by using different approaches, such as, integral transforms, polarization lights, ghost imaging, compressive sensing, joint transform correlator, ptychography, sparse representation, and photon counting [25][26][27][28][29][30][31]. Recently, some optical authentication techniques in conjunction with image encryption schemes have also been discussed, which can provide an additional layer of security to information transmissions [32].…”
Section: Introductionmentioning
confidence: 99%
“…In order to fulfill the security requirements, many encryption schemes have been proposed and analyzed as possible solution systems which include chaos [7]- [9], Scan [10], [11] and some other methods are available [12]- [15]. Each technique has their own merits and demerits in terms of pixel randomness of encoded image, key size, strength, security and size of input data.…”
Section: Figure 1 General Framework Of Cryptographymentioning
confidence: 99%