Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps
Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today’s digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA algorithm, homomorphic encryption, and chaotic maps, speci...
Saved in:
Published in | Entropy (Basel, Switzerland) Vol. 25; no. 11; p. 1478 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
01.11.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today’s digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA algorithm, homomorphic encryption, and chaotic maps, specifically the sine and logistic map, alongside the self-similar properties of the fractal Sierpinski triangle. The proposed fractal-based hybrid cryptosystem leverages Paillier encryption for maintaining security and privacy, while the chaotic maps introduce randomness, periodicity, and robustness. Simultaneously, the fractal Sierpinski triangle generates intricate shapes at different scales, resulting in a substantially expanded key space and heightened sensitivity through randomly selected initial points. The secret keys derived from the chaotic maps and Sierpinski triangle are employed for image encryption. The proposed scheme offers simplicity, efficiency, and robust security, effectively safeguarding against statistical, differential, and brute-force attacks. Through comprehensive experimental evaluations, we demonstrate the superior performance of the proposed scheme compared to existing methods in terms of both security and efficiency. This paper makes a significant contribution to the field of digital image encryption, paving the way for further exploration and optimization in the future. |
---|---|
AbstractList | Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today's digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA algorithm, homomorphic encryption, and chaotic maps, specifically the sine and logistic map, alongside the self-similar properties of the fractal Sierpinski triangle. The proposed fractal-based hybrid cryptosystem leverages Paillier encryption for maintaining security and privacy, while the chaotic maps introduce randomness, periodicity, and robustness. Simultaneously, the fractal Sierpinski triangle generates intricate shapes at different scales, resulting in a substantially expanded key space and heightened sensitivity through randomly selected initial points. The secret keys derived from the chaotic maps and Sierpinski triangle are employed for image encryption. The proposed scheme offers simplicity, efficiency, and robust security, effectively safeguarding against statistical, differential, and brute-force attacks. Through comprehensive experimental evaluations, we demonstrate the superior performance of the proposed scheme compared to existing methods in terms of both security and efficiency. This paper makes a significant contribution to the field of digital image encryption, paving the way for further exploration and optimization in the future.Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today's digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA algorithm, homomorphic encryption, and chaotic maps, specifically the sine and logistic map, alongside the self-similar properties of the fractal Sierpinski triangle. The proposed fractal-based hybrid cryptosystem leverages Paillier encryption for maintaining security and privacy, while the chaotic maps introduce randomness, periodicity, and robustness. Simultaneously, the fractal Sierpinski triangle generates intricate shapes at different scales, resulting in a substantially expanded key space and heightened sensitivity through randomly selected initial points. The secret keys derived from the chaotic maps and Sierpinski triangle are employed for image encryption. The proposed scheme offers simplicity, efficiency, and robust security, effectively safeguarding against statistical, differential, and brute-force attacks. Through comprehensive experimental evaluations, we demonstrate the superior performance of the proposed scheme compared to existing methods in terms of both security and efficiency. This paper makes a significant contribution to the field of digital image encryption, paving the way for further exploration and optimization in the future. Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today’s digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA algorithm, homomorphic encryption, and chaotic maps, specifically the sine and logistic map, alongside the self-similar properties of the fractal Sierpinski triangle. The proposed fractal-based hybrid cryptosystem leverages Paillier encryption for maintaining security and privacy, while the chaotic maps introduce randomness, periodicity, and robustness. Simultaneously, the fractal Sierpinski triangle generates intricate shapes at different scales, resulting in a substantially expanded key space and heightened sensitivity through randomly selected initial points. The secret keys derived from the chaotic maps and Sierpinski triangle are employed for image encryption. The proposed scheme offers simplicity, efficiency, and robust security, effectively safeguarding against statistical, differential, and brute-force attacks. Through comprehensive experimental evaluations, we demonstrate the superior performance of the proposed scheme compared to existing methods in terms of both security and efficiency. This paper makes a significant contribution to the field of digital image encryption, paving the way for further exploration and optimization in the future. |
Audience | Academic |
Author | Mfungo, Dani Elias Fu, Xianping |
Author_xml | – sequence: 1 givenname: Dani Elias orcidid: 0000-0001-7727-2272 surname: Mfungo fullname: Mfungo, Dani Elias – sequence: 2 givenname: Xianping surname: Fu fullname: Fu, Xianping |
BookMark | eNptkV1r2zAUhs3oYG23i_0Dw242qFt9WbZ2l4Z2CXQM9nFtjqWjRMGWPMlh5N9PaUYpZZwLSUfPez54L4ozHzwWxXtKrjlX5AZZTSkVTfuqOKdEqUpwQs6e3d8UFyntCGGcUXleTPcR9AxDdQsJTbk69NGZchkP0xzSIc04fi7v_Ba8dn5TrkfYYH7r478Lvvzj5m35_cfiqlyFMUectk4_A65K8LncFsKc819hSm-L1xaGhO_-nZfFr_u7n8tV9fDty3q5eKh0nnKuWG1kTQypa6OE4k1rGkQrekChkbSslgytsZJLormVLWjUAFkDXGKrLb8s1qe6JsCum6IbIR66AK57TIS46SDmoQbseiWMBCobDUaQXoHgDe2ZZTVhAjnPtT6eak0x_N5jmrvRJY3DAB7DPnWsVbzlTZ4lox9eoLuwjz5v-kgRrupWZur6RG0g93fehjnbkMPg6HR21LqcXzSN4FSplmbBp5NAx5BSRPu0ESXd0fjuyfjM3rxgtZvh6EZu4ob_KP4CZESwNQ |
CitedBy_id | crossref_primary_10_1088_1402_4896_ad3adb crossref_primary_10_1109_ACCESS_2024_3482012 crossref_primary_10_3390_app142210138 crossref_primary_10_1002_spy2_432 crossref_primary_10_1016_j_eswa_2025_126999 crossref_primary_10_3390_app14020718 crossref_primary_10_3390_math12223457 crossref_primary_10_3390_fi17030124 crossref_primary_10_59324_ejaset_2025_3_1__04 |
Cites_doi | 10.1016/j.optlastec.2023.109626 10.1109/TIT.1980.1056264 10.1109/ACCESS.2023.3312611 10.1016/j.chaos.2023.113909 10.1007/s10586-021-03466-2 10.1016/j.optlaseng.2021.106881 10.1109/TCSI.2021.3133627 10.1016/j.sysarc.2023.102855 10.1016/j.image.2021.116523 10.1016/j.ins.2022.11.084 10.1016/j.chaos.2022.111989 10.1007/s11071-023-08545-0 10.4064/fm-33-1-169-173 10.3390/asi5030057 10.3390/fractalfract6070379 10.1007/978-1-4757-4017-2 10.5951/MT.98.4.0228 10.1016/j.optlaseng.2008.09.001 10.1016/j.ins.2022.07.120 10.1016/j.rinp.2021.105010 10.1049/iet-ipr.2013.0570 10.1021/jacs.7b05720 10.1109/UEMCON53757.2021.9666530 10.3390/math10071071 10.1016/j.eswa.2022.116874 10.1016/j.compeleceng.2015.11.008 10.1016/j.imavis.2006.02.021 10.1119/1.13295 10.1016/j.sigpro.2018.06.008 10.1016/j.energy.2021.120716 10.1016/j.eswa.2021.116193 10.1007/3-540-48910-X 10.1002/j.1538-7305.1949.tb00928.x 10.1016/j.sigpro.2014.10.033 10.3390/computation11090178 10.1016/j.ejcon.2023.100786 10.1109/ACCESS.2023.3242311 10.3390/fractalfract6020089 10.1016/j.cosrev.2020.100235 10.1145/3549993 10.1016/j.eswa.2023.120811 10.1016/j.apm.2023.05.004 10.1016/j.ins.2022.01.042 10.3390/math11030767 10.3390/app13064034 10.24033/asens.740 10.1109/TCSI.2022.3172116 10.1111/j.1467-8306.1987.tb00158.x 10.1109/TNNLS.2022.3146570 10.3390/app13127113 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION 7TB 8FD 8FE 8FG ABJCF ABUWG AFKRA AZQEC BENPR BGLVJ CCPQU DWQXO FR3 HCIFZ KR7 L6V M7S PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS 7X8 DOA |
DOI | 10.3390/e25111478 |
DatabaseName | CrossRef Mechanical & Transportation Engineering Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Engineering Research Database SciTech Premium Collection Civil Engineering Abstracts ProQuest Engineering Collection Engineering Database ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection MEDLINE - Academic DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database Technology Collection Technology Research Database ProQuest One Academic Middle East (New) Mechanical & Transportation Engineering Abstracts ProQuest Central Essentials ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Civil Engineering Abstracts Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest One Academic UKI Edition Materials Science & Engineering Collection Engineering Research Database ProQuest One Academic ProQuest One Academic (New) MEDLINE - Academic |
DatabaseTitleList | MEDLINE - Academic Publicly Available Content Database CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
EISSN | 1099-4300 |
ExternalDocumentID | oai_doaj_org_article_b94d6a167cad40b9a4371b2f25024e33 A774319981 10_3390_e25111478 |
GroupedDBID | 29G 2WC 5GY 5VS 8FE 8FG AADQD AAFWJ AAYXX ABDBF ABJCF ACIWK ACUHS ADBBV AEGXH AENEX AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS BCNDV BENPR BGLVJ CCPQU CITATION CS3 DU5 E3Z ESX F5P GROUPED_DOAJ GX1 HCIFZ HH5 IAO ITC J9A KQ8 L6V M7S MODMG M~E OK1 OVT PGMZT PHGZM PHGZT PIMPY PROAC PTHSS RNS RPM TR2 TUS XSB ~8M PMFND 7TB 8FD ABUWG AZQEC DWQXO FR3 KR7 PKEHL PQEST PQGLB PQQKQ PQUKI PRINS 7X8 PUEGO |
ID | FETCH-LOGICAL-c430t-25d650d055d949378d7eef4bae4ce082562efdf6360c3f68acecaad65a36e8cf3 |
IEDL.DBID | BENPR |
ISSN | 1099-4300 |
IngestDate | Wed Aug 27 01:29:24 EDT 2025 Fri Jul 11 12:40:48 EDT 2025 Fri Jul 25 12:02:23 EDT 2025 Tue Jun 10 21:18:26 EDT 2025 Tue Jul 01 01:58:28 EDT 2025 Thu Apr 24 23:01:08 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 11 |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c430t-25d650d055d949378d7eef4bae4ce082562efdf6360c3f68acecaad65a36e8cf3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
ORCID | 0000-0001-7727-2272 |
OpenAccessLink | https://www.proquest.com/docview/2893039586?pq-origsite=%requestingapplication% |
PQID | 2893039586 |
PQPubID | 2032401 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_b94d6a167cad40b9a4371b2f25024e33 proquest_miscellaneous_2893837360 proquest_journals_2893039586 gale_infotracacademiconefile_A774319981 crossref_primary_10_3390_e25111478 crossref_citationtrail_10_3390_e25111478 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2023-11-01 |
PublicationDateYYYYMMDD | 2023-11-01 |
PublicationDate_xml | – month: 11 year: 2023 text: 2023-11-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Entropy (Basel, Switzerland) |
PublicationYear | 2023 |
Publisher | MDPI AG |
Publisher_xml | – name: MDPI AG |
References | Alexan (ref_50) 2023; 11 Devaney (ref_44) 2004; 98 Jun (ref_12) 2022; 4 Alanwar (ref_35) 2023; 71 Goodchild (ref_8) 1987; 77 Dong (ref_40) 2021; 31 Liu (ref_55) 2023; 232 Wu (ref_18) 2018; 153 Alawida (ref_4) 2022; 34 ref_17 ref_15 Zhang (ref_37) 2022; 34 (ref_43) 1945; 33 Ascoli (ref_7) 2022; 69 Xia (ref_36) 2023; 621 Julia (ref_21) 1922; 39 Uddin (ref_14) 2022; 25 Xian (ref_16) 2022; 69 Zaman (ref_52) 2012; 1 (ref_56) 2015; 109 Zhao (ref_34) 2023; 138 Duan (ref_28) 2022; 150 Lai (ref_11) 2023; 34 Li (ref_13) 2022; 158 ref_25 ref_24 ref_23 Williams (ref_31) 1980; 26 Rozouvan (ref_30) 2009; 47 ref_26 Ahmad (ref_27) 2022; 592 Li (ref_20) 2017; 139 Lai (ref_54) 2023; 166 Daoui (ref_42) 2022; 190 Pareek (ref_19) 2006; 24 Alaya (ref_33) 2020; 36 Evsutin (ref_3) 2022; 100 Mandelbrot (ref_22) 1983; 51 ref_32 Singh (ref_38) 2022; 198 Mandal (ref_2) 2022; 609 Shannon (ref_46) 1949; 28 Radwan (ref_29) 2014; 8 ref_45 ref_41 ref_1 Sun (ref_10) 2023; 121 Zhou (ref_51) 2023; 175 Duan (ref_39) 2021; 229 ref_49 ref_9 Zhang (ref_47) 2023; 11 Hu (ref_48) 2023; 111 ref_5 Yavuz (ref_53) 2016; 54 ref_6 |
References_xml | – volume: 166 start-page: 109626 year: 2023 ident: ref_54 article-title: A new image encryption method based on memristive hyperchaos publication-title: Opt. Laser Technol. doi: 10.1016/j.optlastec.2023.109626 – ident: ref_26 – volume: 26 start-page: 726 year: 1980 ident: ref_31 article-title: A modification of the RSA public-key encryption procedure (Corresp.) publication-title: IEEE Trans. Inf. Theory doi: 10.1109/TIT.1980.1056264 – volume: 11 start-page: 108746 year: 2023 ident: ref_47 article-title: Stable Image Encryption Algorithm Based on Expanded One-dimensional Chaotic Jumping and Parallel Encoding Operation Grouping publication-title: IEEE Access doi: 10.1109/ACCESS.2023.3312611 – volume: 175 start-page: 113909 year: 2023 ident: ref_51 article-title: A new conservative chaotic system and its application in image encryption publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2023.113909 – volume: 25 start-page: 999 year: 2022 ident: ref_14 article-title: An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications publication-title: Clust. Comput. doi: 10.1007/s10586-021-03466-2 – volume: 150 start-page: 106881 year: 2022 ident: ref_28 article-title: New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2021.106881 – volume: 69 start-page: 1252 year: 2022 ident: ref_7 article-title: Edge of chaos theory resolves smale paradox publication-title: IEEE Trans. Circuits Syst. I Regul. Pap. doi: 10.1109/TCSI.2021.3133627 – volume: 138 start-page: 102855 year: 2023 ident: ref_34 article-title: PEPA: Paillier cryptosystem-based efficient privacy-preserving authentication scheme for VANETs publication-title: J. Syst. Archit. doi: 10.1016/j.sysarc.2023.102855 – volume: 100 start-page: 116523 year: 2022 ident: ref_3 article-title: Watermarking schemes for digital images: Robustness overview publication-title: Signal Process. Image Commun. doi: 10.1016/j.image.2021.116523 – volume: 621 start-page: 58 year: 2023 ident: ref_36 article-title: Quorum controlled homomorphic re-encryption for privacy preserving computations in the cloud publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.11.084 – volume: 1 start-page: 18 year: 2012 ident: ref_52 article-title: Review on fifteen Statistical Tests proposed by NIST publication-title: J. Theor. Phys. Cryptogr. – volume: 158 start-page: 111989 year: 2022 ident: ref_13 article-title: A novel plaintext-related chaotic image encryption scheme with no additional plaintext information publication-title: Chaos Solitons Fractals doi: 10.1016/j.chaos.2022.111989 – volume: 111 start-page: 19487 year: 2023 ident: ref_48 article-title: Novel 3-D hyperchaotic map with hidden attractor and its application in meaningful image encryption publication-title: Nonlinear Dyn doi: 10.1007/s11071-023-08545-0 – volume: 33 start-page: 169 year: 1945 ident: ref_43 article-title: Sur les fonctions de plusieurs variables publication-title: Fundam. Math. doi: 10.4064/fm-33-1-169-173 – ident: ref_15 doi: 10.3390/asi5030057 – ident: ref_24 doi: 10.3390/fractalfract6070379 – ident: ref_23 doi: 10.1007/978-1-4757-4017-2 – volume: 98 start-page: 228 year: 2004 ident: ref_44 article-title: Fractal Patterns and Chaos Games publication-title: Math. Teach. doi: 10.5951/MT.98.4.0228 – volume: 47 start-page: 1 year: 2009 ident: ref_30 article-title: Modulo image encryption with fractal keys publication-title: Opt. Lasers Eng. doi: 10.1016/j.optlaseng.2008.09.001 – volume: 34 start-page: 2993 year: 2022 ident: ref_37 article-title: High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system publication-title: J. King Saud Univ. Comput. Inf. Sci. – volume: 609 start-page: 1451 year: 2022 ident: ref_2 article-title: Digital image steganography: A literature survey publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.07.120 – volume: 4 start-page: 1 year: 2022 ident: ref_12 article-title: Chaos theory and applications: The physical evidence, mechanism are important in chaotic systems publication-title: Chaos Theory Appl. – volume: 31 start-page: 105010 year: 2021 ident: ref_40 article-title: Chaotification of Sine-series maps based on the internal perturbation model publication-title: Results Phys. doi: 10.1016/j.rinp.2021.105010 – volume: 8 start-page: 742 year: 2014 ident: ref_29 article-title: A fractal-based image encryption system publication-title: IET Image Process. doi: 10.1049/iet-ipr.2013.0570 – volume: 139 start-page: 13749 year: 2017 ident: ref_20 article-title: Construction of Sierpinski triangles up to the fifth order publication-title: J. Am. Chem. Soc. doi: 10.1021/jacs.7b05720 – ident: ref_45 doi: 10.1109/UEMCON53757.2021.9666530 – ident: ref_32 doi: 10.3390/math10071071 – volume: 198 start-page: 116874 year: 2022 ident: ref_38 article-title: Chaotic and Paillier secure image data sharing based on blockchain and cloud security publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.116874 – volume: 54 start-page: 471 year: 2016 ident: ref_53 article-title: A chaos-based image encryption algorithm with simple logical functions publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2015.11.008 – volume: 24 start-page: 926 year: 2006 ident: ref_19 article-title: Image encryption using chaotic logistic map publication-title: Image Vis. Comput. doi: 10.1016/j.imavis.2006.02.021 – volume: 51 start-page: 286 year: 1983 ident: ref_22 article-title: The Fractal Geometry of Nature publication-title: Am. J. Phys. doi: 10.1119/1.13295 – volume: 153 start-page: 11 year: 2018 ident: ref_18 article-title: Image encryption using 2D Hénon-Sine map and DNA approach publication-title: Signal Process. doi: 10.1016/j.sigpro.2018.06.008 – volume: 229 start-page: 120716 year: 2021 ident: ref_39 article-title: A multivariate grey prediction model based on energy logistic equation and its application in energy prediction in China publication-title: Energy doi: 10.1016/j.energy.2021.120716 – volume: 190 start-page: 116193 year: 2022 ident: ref_42 article-title: Robust image encryption and zero-watermarking scheme using SCA and modified logistic map publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2021.116193 – ident: ref_5 doi: 10.1007/3-540-48910-X – volume: 28 start-page: 656 year: 1949 ident: ref_46 article-title: Communication Theory of Secrecy Systems publication-title: Bell Syst. Tech. J. doi: 10.1002/j.1538-7305.1949.tb00928.x – volume: 109 start-page: 119 year: 2015 ident: ref_56 article-title: A RGB image encryption algorithm based on total plain image characteristics and chaos publication-title: Signal Process. doi: 10.1016/j.sigpro.2014.10.033 – ident: ref_49 doi: 10.3390/computation11090178 – volume: 71 start-page: 100786 year: 2023 ident: ref_35 article-title: Privacy-preserving set-based estimation using partially homomorphic encryption publication-title: Eur. J. Control doi: 10.1016/j.ejcon.2023.100786 – volume: 11 start-page: 11541 year: 2023 ident: ref_50 article-title: Color Image Encryption Through Chaos and KAA Map publication-title: IEEE Access doi: 10.1109/ACCESS.2023.3242311 – ident: ref_25 doi: 10.3390/fractalfract6020089 – ident: ref_6 – volume: 36 start-page: 100235 year: 2020 ident: ref_33 article-title: Homomorphic encryption systems statement: Trends and challenges publication-title: Comput. Sci. Rev. doi: 10.1016/j.cosrev.2020.100235 – volume: 34 start-page: 8136 year: 2022 ident: ref_4 article-title: A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations publication-title: J. King Saud Univ. Comput. Inf. Sci. – ident: ref_1 doi: 10.1145/3549993 – volume: 232 start-page: 120811 year: 2023 ident: ref_55 article-title: Target-based Image Encryption via Infinite Interval Chaotic System with Ill-conditioned Parameter and 3DBDM publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2023.120811 – volume: 121 start-page: 463 year: 2023 ident: ref_10 article-title: Dynamic analysis of HR-FN-HR neural network coupled by locally active hyperbolic memristors and encryption application based on knuth-Durstenfeld algorithm publication-title: Appl. Math. Model. doi: 10.1016/j.apm.2023.05.004 – volume: 592 start-page: 1 year: 2022 ident: ref_27 article-title: An image encryption algorithm based on new generalized fusion fractal structure publication-title: Inf. Sci. doi: 10.1016/j.ins.2022.01.042 – ident: ref_17 doi: 10.3390/math11030767 – ident: ref_9 doi: 10.3390/app13064034 – volume: 39 start-page: 131 year: 1922 ident: ref_21 article-title: Mémoire sur la permutabilité des fractions rationnelles publication-title: Ann. Sci. De L’école Norm. Supérieure doi: 10.24033/asens.740 – volume: 69 start-page: 3320 year: 2022 ident: ref_16 article-title: Spiral-transform-based fractal sorting matrix for chaotic image encryption publication-title: IEEE Trans. Circuits Syst. I Regul. Pap. doi: 10.1109/TCSI.2022.3172116 – volume: 77 start-page: 265 year: 1987 ident: ref_8 article-title: The fractal nature of geographic phenomena publication-title: Ann. Assoc. Am. Geogr. doi: 10.1111/j.1467-8306.1987.tb00158.x – volume: 34 start-page: 7824 year: 2023 ident: ref_11 article-title: Design and Analysis of Multiscroll Memristive Hopfield Neural Network With Adjustable Memductance and Application to Image Encryption publication-title: IEEE Trans. Neural Netw. Learn. Syst. doi: 10.1109/TNNLS.2022.3146570 – ident: ref_41 doi: 10.3390/app13127113 |
SSID | ssj0023216 |
Score | 2.3828926 |
Snippet | Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today’s digital era. This paper introduces... Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today's digital era. This paper introduces... |
SourceID | doaj proquest gale crossref |
SourceType | Open Website Aggregation Database Enrichment Source Index Database |
StartPage | 1478 |
SubjectTerms | Algorithms Chaos theory Confidentiality Cryptography Data encryption Data integrity Digital data Digital imaging fractal Fractals image encryption Image enhancement Paillier encryption Parameter estimation Prime numbers Privacy Processing speed Security Self-similarity Sierpinski triangle Trends Triangles |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT9wwELUqTlxQq4JIC5VBSPRARGI7TtzbglgtSPTQFomb5Y9xqQTJCpYD_74zSXZFJSouKKfEk9iZiTPzEs8bxg6g9NI1yuSxLk2uXKVybxJOvKRNRSvH60TZyJff9exKXVxX189KfdGasIEeeFDcsTcqalfqOrioCm-cknXpRULXLRTInucTfd4STI1QS4pSDzxCEkH9MVAgjf02_3ifnqT_f6_i3r9M37ONMTDkk2FAH9g7aD-y-ZSSmNxtfoLOJvLZE-VX8dP7p_miGziYv_Gz9oY4M9rf_PwOXw64H6gd9c3pIyv_8XNyxGfdHW6o0z_hmcARdy1e7sZ12Cm_dPOHTXY1Pft1OsvHGgl5ULJY5KKKGGPFoqqiURhqNLEGSMo7UAEI_mkBKSZiBQsy6cYFCM7hOU5qaEKSW2yt7VrYZtyDkFF4pUxK6OZjAyoWAmQIonACIGNfl7qzYSQQpzoWtxaBBKnZrtScsf2V6HxgzXhJ6IQMsBIgouv-AJrfjua3r5k_Y4dkPkvTEQcT3JhVgLdExFZ2UlOIhJiyzNjO0sJ2nKcPFuEm-nBTNTpje6tmnGH028S10D0OMgjjUYOf3mLEn9k6lawf8hl32Nri_hF2MbBZ-C_9M_wXZcz2HA priority: 102 providerName: Directory of Open Access Journals |
Title | Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps |
URI | https://www.proquest.com/docview/2893039586 https://www.proquest.com/docview/2893837360 https://doaj.org/article/b94d6a167cad40b9a4371b2f25024e33 |
Volume | 25 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3da9swEBdr-7KXsbGNeeuCWgbbQ01tSf7qy0hK0mzQMroV8mZk6dQWWttL0of-972zFXeDdRgMts6SffKd7iTd7xj7BHElda6K0GZxESqdqLAqHAqeS4uEdo5njqKRT8_S-YX6vkgWfsJt5bdVbnRip6htY2iO_BAdA9S2RZKnX9vfIWWNotVVn0Jji-2gCs7R-dqZTM9-nA8ulxRx2uMJSXTuD4EMamw__2sU6sD6n1LJ3Tgze8leeAORj_sefcWeQf2atTMKZtI34QQHHcvn9xRnxY-X9-266bGYj_i0viLsjPqSf7tFJYHXhsqR75wmW_n5z_EBnze3eCBvr80fBAdc11jdlW6wUX6q29UbdjGb_jqehz5XQmiUjNahSCzaWjZKElsoNDlymwE4VWlQBsgNTAU46wgdzEiX5tqA0Rqf0TKF3Dj5lm3XTQ3vGK9ASCsqpQrncLi3OSgbCZDGiEgLgIB92fCuNB5InPJZ3JToUBCby4HNAdsfSNsePeNfRBPqgIGAAK-7G83ysvTyU1aFsqmO08xoq6Kq0EpmcSUcWnBCgZQB-0zdV5JY4ssY7aML8JMI4KocZ2QqoW8ZB2x308Oll9dV-fh3BWxvKEZJo-UTXUNz19OgO48cfP__Kj6w55SUvo9Y3GXb6-UdfETTZV2N2FY-Oxn5v3TUTQDg-WQRPwCVP_JN |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtR3LbtQw0CrlABcEAsRCCwaB4NCoie08jITQtnTJ0m4P0Eq9GcePtlKbhN2t0P4U38hMXoAE3KqcEk-ceN6TeGYIeemigutMyMCmkQyEjkVQSA-C5xMZ487x1GM28uwwyY_Fp5P4ZI386HNhcFtlrxMbRW0rg9_ItyEwAG0r4yx5X38LsGsU_l3tW2i0bLHvVt8hZFu8m34A-r5ibLJ3tJsHXVeBwAgeLgMWW_BKbBjHVgowzplNnfOi0E4YhwFTwpy3HutoGe6TTBtntIZ7NE9cZjyHeW-Qm4JziRKVTT4OAR5nUdJWL4LBcNuh-w6rzf6weU1rgH8ZgMaqTe6SO507Ssct_9wja668T-oJpk7pi2AHTJyl-QqzuujufFUvq7by81u6V55hpY7ylE4vQSXBucFxoDLFT7v085fxFs2rSziAkufmN4AtqkuY7kxX8FA60_XiATm-Fhw-JOtlVbpHhBaOccsKIaT34FzYzAkbMseNYaFmzo3Imx53ynRly7F7xoWC8AXRrAY0j8iLAbRua3X8DWgHCTAAYHnt5kI1P1WdtKpCCpvoKEmNtiIspBY8jQrmwV9kwnE-Iq-RfAqVALyM0V0uAywJy2mpcYqOGUSy0Yhs9BRWnXZYqF-8PCLPh2GQa_xZo0tXXbUwGU8Bg4__P8Uzcis_mh2og-nh_hNymwEbtrmSG2R9Ob9ym-A0LYunDadS8vW6ReMnRYkszA |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtR1db9Mw0BqdhHhBIEAUBhgEgodFTWznw0gItVurlrFqGkzam3H8sSFtSWg7of41fh13zQcgAW9TnpJcnPi-L_bdEfLSRTnXmZCBTSMZCB2LIJceBM8nMsad46nHbOTDeTI9ER9O49Mt8qPNhcFtla1O3ChqWxr8Rz6AwAC0rYyzZOCbbRFH-5P31bcAO0jhSmvbTqNmkQO3_g7h2_LdbB9o_Yqxyfjz3jRoOgwERvBwFbDYgodiwzi2UoChzmzqnBe5dsI4DJ4S5rz1WFPLcJ9k2jijNTyjeeIy4zmMe4NspxAVhT2yPRrPj467cI-zKKlrGXEuw4FDZx7mnv1hATeNAv5lDjY2bnKH3G6cUzqsueku2XLFPVJNMJFKXwQjMHiWTteY40X3FutqVdZ1oN_ScXGOdTuKMzq7BAUF5wbvA80p_uilx5-Gu3RaXsIBdP1qfgPYpbqA4c51CS-lh7pa3icn14LFB6RXlIV7SGjuGLcsF0J6D66GzZywIXPcGBZq5lyfvGlxp0xTxBx7aVwoCGYQzapDc5-86ECrunLH34BGSIAOAIttby6UizPVyK7KpbCJjpLUaCvCXGrB0yhnHrxHJhznffIayadQJcDHGN1kNsCUsLiWGqbopkFcG_XJTkth1eiKpfrF2X3yvLsNUo5LN7pw5VUNk_EUMPjo_0M8IzdBLNTH2fzgMbnFgAvrxMkd0lstrtwT8KBW-dOGVSn5ct3S8RMAxTJe |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fractal-Based+Hybrid+Cryptosystem%3A+Enhancing+Image+Encryption+with+RSA%2C+Homomorphic+Encryption%2C+and+Chaotic+Maps&rft.jtitle=Entropy+%28Basel%2C+Switzerland%29&rft.au=Dani+Elias+Mfungo&rft.au=Fu%2C+Xianping&rft.date=2023-11-01&rft.pub=MDPI+AG&rft.eissn=1099-4300&rft.volume=25&rft.issue=11&rft.spage=1478&rft_id=info:doi/10.3390%2Fe25111478&rft.externalDBID=HAS_PDF_LINK |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1099-4300&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1099-4300&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1099-4300&client=summon |