178
Views
7
CrossRef citations to date
0
Altmetric
Articles

Chaos-Based Image Encryption Using Sum Operation Modulo 4 and 256

, , &

References

  • B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh, and M. R. Mosavi, “A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process,” Multimedia Tools Appl., Vol. 71, no. 3, pp. 1469–97, Aug. 2014.
  • H. Hermassi et al., “Improvement of an image encryption algorithm based on hyper-chaos,” Telecommun. Syst., Vol. 52, pp. 539–49, Feb. 2013.
  • G. Ye, and K.-W. Wong, “An efficient chaotic image encryption algorithm based on a generalized Arnold map,” Nonlinear Dyn., Vol. 69, pp. 2079–87, Apr. 2012.
  • X. Wang and Q. Zhang, “DNA computing-based cryptography,” in 4th International Conference on Bio-Inspired Computing, BIC-TA '09, Beijing, China, 2009, pp. 10–3.
  • H. J. Shiu, K. L. Ng, J. F. Fang, R. C. T. Lee, and C. H. Huang, “Data hiding methods based upon DNA sequences,” Inf. Sci., Vol. 180, no. 11, pp. 2196–208, Jun. 2010.
  • M. Babaei, “An efficient combination of chaotic logistic map and DNA computing for data encryption,” in 9th International ISC Conference on Information Security and Cryptology, Tabriz University, Iran, 2012.
  • Q. Wang, Q. Zhang, and C. Zhou, “A multilevel image encryption algorithm based on chaos and DNA coding,” in 4th International Conference on Bio-Inspired Computing, BIC-TA '09, Beijing, China, 2009, pp 1–5.
  • X. Wei, L. Guo, Q. Zhang, J. Zhang, and S. Lian, “A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system,” J. Syst. Softw., Vol. 85, no. 2, pp. 290–9, Feb. 2012.
  • L. Liu, Q. Zhang, and X. Wei, “A RGB image encryption algorithm based on DNA encoding and chaos map,” Comput. Electr. Eng., Vol. 38, no. 5, pp. 1240–8, Sept. 2012.
  • Q. Zhang, L. Guo, and X. Wei, “Image encryption using DNA addition combining with chaotic maps,” Math. Comput. Model., Vol. 52, no. 11–12, pp. 2028–35, Dec. 2010.
  • S. Zhou, Q. Zhang, and X. Wei, “Image encryption algorithm based on DNA sequences for the big image,” in International Conference on Multimedia Information Networking and Security (MINES), Nanjing University, China, 2010, pp. 884–8.
  • H. Liu, X. Wang, and A. Kadir, “Image encryption using DNA complementary rule and chaotic maps,” Appl. Soft Comput., Vol. 12, no. 5, pp. 1457–66, May 2012.
  • Y. Wu, Y. Zhou, J. P. Noonan, and S. Agaian, “Design of image cipher using Latin squares,” Inf. Sci., Vol. 264, pp. 317–39, Apr. 2014.
  • M. Amos, G. Pǎun, G. Rozenberg, and A. Salomaa, “Topics in the theory of DNA computing,” Theor. Comput. Sci., Vol. 287, no. 1, pp. 3–38, Sept. 2002.
  • M. Borda, and O. Tornea, “DNA secret writing techniques,” in 8th International Conference on Communications (COMM), Romania, 2010, pp. 451–6.
  • Q. Zhang, L. Guo, and X. Wei, “A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system,” Optik Int. J. Light Electron Optics, Vol. 124, no. 18, pp. 3596–600, Sept. 2013.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.