Evolutionary-based image encryption using biomolecules operators and non-coupled map lattice
AA Abbasi, M Mazinani, R Hosseini - Optik, 2020 - Elsevier
Abstract Information security is one of the important defensive issues in coping with attacks
to valuable information of organizations. Image encryption is one of the passive defense
tools to provide the information and communication security. In this paper, a chaotic
evolutionary biomolecules operators model (CEBOM) was presented for image encryption.
The proposed model consisted of three steps. In the first step, a secret key was considered
for the initial value of the non-coupled map lattice function using the SHA (Secure Hash …
to valuable information of organizations. Image encryption is one of the passive defense
tools to provide the information and communication security. In this paper, a chaotic
evolutionary biomolecules operators model (CEBOM) was presented for image encryption.
The proposed model consisted of three steps. In the first step, a secret key was considered
for the initial value of the non-coupled map lattice function using the SHA (Secure Hash …
Evolutionary-based image encryption using biomolecules and non-coupled map lattice
AA Abbasi, M Mazinani, R Hosseini - Optics & Laser Technology, 2021 - Elsevier
Image encryption is an effective way of protecting multimedia data; it is done by transferring
multimedia data into an undetectable format within the network context. In this paper, a new
Chaotic Evolutionary Biomolecules Model (CEBM) based on the concepts of biological
molecules (DNA and RNA) is presented for image encryption. The proposed model consists
of four phases. In the first phase, a secret 256-bit key using the SHA-256 algorithm is
assumed for the initial value of the non-coupled map lattice function. In the second phase …
multimedia data into an undetectable format within the network context. In this paper, a new
Chaotic Evolutionary Biomolecules Model (CEBM) based on the concepts of biological
molecules (DNA and RNA) is presented for image encryption. The proposed model consists
of four phases. In the first phase, a secret 256-bit key using the SHA-256 algorithm is
assumed for the initial value of the non-coupled map lattice function. In the second phase …
以上显示的是最相近的搜索结果。 查看全部搜索结果