Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps

Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today’s digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA algorithm, homomorphic encryption, and chaotic maps, speci...

Full description

Saved in:
Bibliographic Details
Published inEntropy (Basel, Switzerland) Vol. 25; no. 11; p. 1478
Main Authors Mfungo, Dani Elias, Fu, Xianping
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 01.11.2023
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today’s digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA algorithm, homomorphic encryption, and chaotic maps, specifically the sine and logistic map, alongside the self-similar properties of the fractal Sierpinski triangle. The proposed fractal-based hybrid cryptosystem leverages Paillier encryption for maintaining security and privacy, while the chaotic maps introduce randomness, periodicity, and robustness. Simultaneously, the fractal Sierpinski triangle generates intricate shapes at different scales, resulting in a substantially expanded key space and heightened sensitivity through randomly selected initial points. The secret keys derived from the chaotic maps and Sierpinski triangle are employed for image encryption. The proposed scheme offers simplicity, efficiency, and robust security, effectively safeguarding against statistical, differential, and brute-force attacks. Through comprehensive experimental evaluations, we demonstrate the superior performance of the proposed scheme compared to existing methods in terms of both security and efficiency. This paper makes a significant contribution to the field of digital image encryption, paving the way for further exploration and optimization in the future.
AbstractList Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today's digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA algorithm, homomorphic encryption, and chaotic maps, specifically the sine and logistic map, alongside the self-similar properties of the fractal Sierpinski triangle. The proposed fractal-based hybrid cryptosystem leverages Paillier encryption for maintaining security and privacy, while the chaotic maps introduce randomness, periodicity, and robustness. Simultaneously, the fractal Sierpinski triangle generates intricate shapes at different scales, resulting in a substantially expanded key space and heightened sensitivity through randomly selected initial points. The secret keys derived from the chaotic maps and Sierpinski triangle are employed for image encryption. The proposed scheme offers simplicity, efficiency, and robust security, effectively safeguarding against statistical, differential, and brute-force attacks. Through comprehensive experimental evaluations, we demonstrate the superior performance of the proposed scheme compared to existing methods in terms of both security and efficiency. This paper makes a significant contribution to the field of digital image encryption, paving the way for further exploration and optimization in the future.Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today's digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA algorithm, homomorphic encryption, and chaotic maps, specifically the sine and logistic map, alongside the self-similar properties of the fractal Sierpinski triangle. The proposed fractal-based hybrid cryptosystem leverages Paillier encryption for maintaining security and privacy, while the chaotic maps introduce randomness, periodicity, and robustness. Simultaneously, the fractal Sierpinski triangle generates intricate shapes at different scales, resulting in a substantially expanded key space and heightened sensitivity through randomly selected initial points. The secret keys derived from the chaotic maps and Sierpinski triangle are employed for image encryption. The proposed scheme offers simplicity, efficiency, and robust security, effectively safeguarding against statistical, differential, and brute-force attacks. Through comprehensive experimental evaluations, we demonstrate the superior performance of the proposed scheme compared to existing methods in terms of both security and efficiency. This paper makes a significant contribution to the field of digital image encryption, paving the way for further exploration and optimization in the future.
Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today’s digital era. This paper introduces a novel approach to enhance image encryption by combining the strengths of the RSA algorithm, homomorphic encryption, and chaotic maps, specifically the sine and logistic map, alongside the self-similar properties of the fractal Sierpinski triangle. The proposed fractal-based hybrid cryptosystem leverages Paillier encryption for maintaining security and privacy, while the chaotic maps introduce randomness, periodicity, and robustness. Simultaneously, the fractal Sierpinski triangle generates intricate shapes at different scales, resulting in a substantially expanded key space and heightened sensitivity through randomly selected initial points. The secret keys derived from the chaotic maps and Sierpinski triangle are employed for image encryption. The proposed scheme offers simplicity, efficiency, and robust security, effectively safeguarding against statistical, differential, and brute-force attacks. Through comprehensive experimental evaluations, we demonstrate the superior performance of the proposed scheme compared to existing methods in terms of both security and efficiency. This paper makes a significant contribution to the field of digital image encryption, paving the way for further exploration and optimization in the future.
Audience Academic
Author Mfungo, Dani Elias
Fu, Xianping
Author_xml – sequence: 1
  givenname: Dani Elias
  orcidid: 0000-0001-7727-2272
  surname: Mfungo
  fullname: Mfungo, Dani Elias
– sequence: 2
  givenname: Xianping
  surname: Fu
  fullname: Fu, Xianping
BookMark eNptkV1r2zAUhs3oYG23i_0Dw242qFt9WbZ2l4Z2CXQM9nFtjqWjRMGWPMlh5N9PaUYpZZwLSUfPez54L4ozHzwWxXtKrjlX5AZZTSkVTfuqOKdEqUpwQs6e3d8UFyntCGGcUXleTPcR9AxDdQsJTbk69NGZchkP0xzSIc04fi7v_Ba8dn5TrkfYYH7r478Lvvzj5m35_cfiqlyFMUectk4_A65K8LncFsKc819hSm-L1xaGhO_-nZfFr_u7n8tV9fDty3q5eKh0nnKuWG1kTQypa6OE4k1rGkQrekChkbSslgytsZJLormVLWjUAFkDXGKrLb8s1qe6JsCum6IbIR66AK57TIS46SDmoQbseiWMBCobDUaQXoHgDe2ZZTVhAjnPtT6eak0x_N5jmrvRJY3DAB7DPnWsVbzlTZ4lox9eoLuwjz5v-kgRrupWZur6RG0g93fehjnbkMPg6HR21LqcXzSN4FSplmbBp5NAx5BSRPu0ESXd0fjuyfjM3rxgtZvh6EZu4ob_KP4CZESwNQ
CitedBy_id crossref_primary_10_1088_1402_4896_ad3adb
crossref_primary_10_1109_ACCESS_2024_3482012
crossref_primary_10_3390_app142210138
crossref_primary_10_1002_spy2_432
crossref_primary_10_1016_j_eswa_2025_126999
crossref_primary_10_3390_app14020718
crossref_primary_10_3390_math12223457
crossref_primary_10_3390_fi17030124
crossref_primary_10_59324_ejaset_2025_3_1__04
Cites_doi 10.1016/j.optlastec.2023.109626
10.1109/TIT.1980.1056264
10.1109/ACCESS.2023.3312611
10.1016/j.chaos.2023.113909
10.1007/s10586-021-03466-2
10.1016/j.optlaseng.2021.106881
10.1109/TCSI.2021.3133627
10.1016/j.sysarc.2023.102855
10.1016/j.image.2021.116523
10.1016/j.ins.2022.11.084
10.1016/j.chaos.2022.111989
10.1007/s11071-023-08545-0
10.4064/fm-33-1-169-173
10.3390/asi5030057
10.3390/fractalfract6070379
10.1007/978-1-4757-4017-2
10.5951/MT.98.4.0228
10.1016/j.optlaseng.2008.09.001
10.1016/j.ins.2022.07.120
10.1016/j.rinp.2021.105010
10.1049/iet-ipr.2013.0570
10.1021/jacs.7b05720
10.1109/UEMCON53757.2021.9666530
10.3390/math10071071
10.1016/j.eswa.2022.116874
10.1016/j.compeleceng.2015.11.008
10.1016/j.imavis.2006.02.021
10.1119/1.13295
10.1016/j.sigpro.2018.06.008
10.1016/j.energy.2021.120716
10.1016/j.eswa.2021.116193
10.1007/3-540-48910-X
10.1002/j.1538-7305.1949.tb00928.x
10.1016/j.sigpro.2014.10.033
10.3390/computation11090178
10.1016/j.ejcon.2023.100786
10.1109/ACCESS.2023.3242311
10.3390/fractalfract6020089
10.1016/j.cosrev.2020.100235
10.1145/3549993
10.1016/j.eswa.2023.120811
10.1016/j.apm.2023.05.004
10.1016/j.ins.2022.01.042
10.3390/math11030767
10.3390/app13064034
10.24033/asens.740
10.1109/TCSI.2022.3172116
10.1111/j.1467-8306.1987.tb00158.x
10.1109/TNNLS.2022.3146570
10.3390/app13127113
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
7TB
8FD
8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FR3
HCIFZ
KR7
L6V
M7S
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
7X8
DOA
DOI 10.3390/e25111478
DatabaseName CrossRef
Mechanical & Transportation Engineering Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
Engineering Research Database
SciTech Premium Collection
Civil Engineering Abstracts
ProQuest Engineering Collection
Engineering Database
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
MEDLINE - Academic
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Technology Collection
Technology Research Database
ProQuest One Academic Middle East (New)
Mechanical & Transportation Engineering Abstracts
ProQuest Central Essentials
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Civil Engineering Abstracts
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Engineering Research Database
ProQuest One Academic
ProQuest One Academic (New)
MEDLINE - Academic
DatabaseTitleList MEDLINE - Academic
Publicly Available Content Database


CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
EISSN 1099-4300
ExternalDocumentID oai_doaj_org_article_b94d6a167cad40b9a4371b2f25024e33
A774319981
10_3390_e25111478
GroupedDBID 29G
2WC
5GY
5VS
8FE
8FG
AADQD
AAFWJ
AAYXX
ABDBF
ABJCF
ACIWK
ACUHS
ADBBV
AEGXH
AENEX
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BENPR
BGLVJ
CCPQU
CITATION
CS3
DU5
E3Z
ESX
F5P
GROUPED_DOAJ
GX1
HCIFZ
HH5
IAO
ITC
J9A
KQ8
L6V
M7S
MODMG
M~E
OK1
OVT
PGMZT
PHGZM
PHGZT
PIMPY
PROAC
PTHSS
RNS
RPM
TR2
TUS
XSB
~8M
PMFND
7TB
8FD
ABUWG
AZQEC
DWQXO
FR3
KR7
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
7X8
PUEGO
ID FETCH-LOGICAL-c430t-25d650d055d949378d7eef4bae4ce082562efdf6360c3f68acecaad65a36e8cf3
IEDL.DBID BENPR
ISSN 1099-4300
IngestDate Wed Aug 27 01:29:24 EDT 2025
Fri Jul 11 12:40:48 EDT 2025
Fri Jul 25 12:02:23 EDT 2025
Tue Jun 10 21:18:26 EDT 2025
Tue Jul 01 01:58:28 EDT 2025
Thu Apr 24 23:01:08 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 11
Language English
License https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c430t-25d650d055d949378d7eef4bae4ce082562efdf6360c3f68acecaad65a36e8cf3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0001-7727-2272
OpenAccessLink https://www.proquest.com/docview/2893039586?pq-origsite=%requestingapplication%
PQID 2893039586
PQPubID 2032401
ParticipantIDs doaj_primary_oai_doaj_org_article_b94d6a167cad40b9a4371b2f25024e33
proquest_miscellaneous_2893837360
proquest_journals_2893039586
gale_infotracacademiconefile_A774319981
crossref_primary_10_3390_e25111478
crossref_citationtrail_10_3390_e25111478
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2023-11-01
PublicationDateYYYYMMDD 2023-11-01
PublicationDate_xml – month: 11
  year: 2023
  text: 2023-11-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Entropy (Basel, Switzerland)
PublicationYear 2023
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References Alexan (ref_50) 2023; 11
Devaney (ref_44) 2004; 98
Jun (ref_12) 2022; 4
Alanwar (ref_35) 2023; 71
Goodchild (ref_8) 1987; 77
Dong (ref_40) 2021; 31
Liu (ref_55) 2023; 232
Wu (ref_18) 2018; 153
Alawida (ref_4) 2022; 34
ref_17
ref_15
Zhang (ref_37) 2022; 34
(ref_43) 1945; 33
Ascoli (ref_7) 2022; 69
Xia (ref_36) 2023; 621
Julia (ref_21) 1922; 39
Uddin (ref_14) 2022; 25
Xian (ref_16) 2022; 69
Zaman (ref_52) 2012; 1
(ref_56) 2015; 109
Zhao (ref_34) 2023; 138
Duan (ref_28) 2022; 150
Lai (ref_11) 2023; 34
Li (ref_13) 2022; 158
ref_25
ref_24
ref_23
Williams (ref_31) 1980; 26
Rozouvan (ref_30) 2009; 47
ref_26
Ahmad (ref_27) 2022; 592
Li (ref_20) 2017; 139
Lai (ref_54) 2023; 166
Daoui (ref_42) 2022; 190
Pareek (ref_19) 2006; 24
Alaya (ref_33) 2020; 36
Evsutin (ref_3) 2022; 100
Mandelbrot (ref_22) 1983; 51
ref_32
Singh (ref_38) 2022; 198
Mandal (ref_2) 2022; 609
Shannon (ref_46) 1949; 28
Radwan (ref_29) 2014; 8
ref_45
ref_41
ref_1
Sun (ref_10) 2023; 121
Zhou (ref_51) 2023; 175
Duan (ref_39) 2021; 229
ref_49
ref_9
Zhang (ref_47) 2023; 11
Hu (ref_48) 2023; 111
ref_5
Yavuz (ref_53) 2016; 54
ref_6
References_xml – volume: 166
  start-page: 109626
  year: 2023
  ident: ref_54
  article-title: A new image encryption method based on memristive hyperchaos
  publication-title: Opt. Laser Technol.
  doi: 10.1016/j.optlastec.2023.109626
– ident: ref_26
– volume: 26
  start-page: 726
  year: 1980
  ident: ref_31
  article-title: A modification of the RSA public-key encryption procedure (Corresp.)
  publication-title: IEEE Trans. Inf. Theory
  doi: 10.1109/TIT.1980.1056264
– volume: 11
  start-page: 108746
  year: 2023
  ident: ref_47
  article-title: Stable Image Encryption Algorithm Based on Expanded One-dimensional Chaotic Jumping and Parallel Encoding Operation Grouping
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2023.3312611
– volume: 175
  start-page: 113909
  year: 2023
  ident: ref_51
  article-title: A new conservative chaotic system and its application in image encryption
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2023.113909
– volume: 25
  start-page: 999
  year: 2022
  ident: ref_14
  article-title: An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications
  publication-title: Clust. Comput.
  doi: 10.1007/s10586-021-03466-2
– volume: 150
  start-page: 106881
  year: 2022
  ident: ref_28
  article-title: New color image encryption scheme based on multi-parameter fractional discrete Tchebyshev moments and nonlinear fractal permutation method
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2021.106881
– volume: 69
  start-page: 1252
  year: 2022
  ident: ref_7
  article-title: Edge of chaos theory resolves smale paradox
  publication-title: IEEE Trans. Circuits Syst. I Regul. Pap.
  doi: 10.1109/TCSI.2021.3133627
– volume: 138
  start-page: 102855
  year: 2023
  ident: ref_34
  article-title: PEPA: Paillier cryptosystem-based efficient privacy-preserving authentication scheme for VANETs
  publication-title: J. Syst. Archit.
  doi: 10.1016/j.sysarc.2023.102855
– volume: 100
  start-page: 116523
  year: 2022
  ident: ref_3
  article-title: Watermarking schemes for digital images: Robustness overview
  publication-title: Signal Process. Image Commun.
  doi: 10.1016/j.image.2021.116523
– volume: 621
  start-page: 58
  year: 2023
  ident: ref_36
  article-title: Quorum controlled homomorphic re-encryption for privacy preserving computations in the cloud
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.11.084
– volume: 1
  start-page: 18
  year: 2012
  ident: ref_52
  article-title: Review on fifteen Statistical Tests proposed by NIST
  publication-title: J. Theor. Phys. Cryptogr.
– volume: 158
  start-page: 111989
  year: 2022
  ident: ref_13
  article-title: A novel plaintext-related chaotic image encryption scheme with no additional plaintext information
  publication-title: Chaos Solitons Fractals
  doi: 10.1016/j.chaos.2022.111989
– volume: 111
  start-page: 19487
  year: 2023
  ident: ref_48
  article-title: Novel 3-D hyperchaotic map with hidden attractor and its application in meaningful image encryption
  publication-title: Nonlinear Dyn
  doi: 10.1007/s11071-023-08545-0
– volume: 33
  start-page: 169
  year: 1945
  ident: ref_43
  article-title: Sur les fonctions de plusieurs variables
  publication-title: Fundam. Math.
  doi: 10.4064/fm-33-1-169-173
– ident: ref_15
  doi: 10.3390/asi5030057
– ident: ref_24
  doi: 10.3390/fractalfract6070379
– ident: ref_23
  doi: 10.1007/978-1-4757-4017-2
– volume: 98
  start-page: 228
  year: 2004
  ident: ref_44
  article-title: Fractal Patterns and Chaos Games
  publication-title: Math. Teach.
  doi: 10.5951/MT.98.4.0228
– volume: 47
  start-page: 1
  year: 2009
  ident: ref_30
  article-title: Modulo image encryption with fractal keys
  publication-title: Opt. Lasers Eng.
  doi: 10.1016/j.optlaseng.2008.09.001
– volume: 34
  start-page: 2993
  year: 2022
  ident: ref_37
  article-title: High-efficiency and visual-usability image encryption based on thumbnail preserving and chaotic system
  publication-title: J. King Saud Univ. Comput. Inf. Sci.
– volume: 609
  start-page: 1451
  year: 2022
  ident: ref_2
  article-title: Digital image steganography: A literature survey
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.07.120
– volume: 4
  start-page: 1
  year: 2022
  ident: ref_12
  article-title: Chaos theory and applications: The physical evidence, mechanism are important in chaotic systems
  publication-title: Chaos Theory Appl.
– volume: 31
  start-page: 105010
  year: 2021
  ident: ref_40
  article-title: Chaotification of Sine-series maps based on the internal perturbation model
  publication-title: Results Phys.
  doi: 10.1016/j.rinp.2021.105010
– volume: 8
  start-page: 742
  year: 2014
  ident: ref_29
  article-title: A fractal-based image encryption system
  publication-title: IET Image Process.
  doi: 10.1049/iet-ipr.2013.0570
– volume: 139
  start-page: 13749
  year: 2017
  ident: ref_20
  article-title: Construction of Sierpinski triangles up to the fifth order
  publication-title: J. Am. Chem. Soc.
  doi: 10.1021/jacs.7b05720
– ident: ref_45
  doi: 10.1109/UEMCON53757.2021.9666530
– ident: ref_32
  doi: 10.3390/math10071071
– volume: 198
  start-page: 116874
  year: 2022
  ident: ref_38
  article-title: Chaotic and Paillier secure image data sharing based on blockchain and cloud security
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2022.116874
– volume: 54
  start-page: 471
  year: 2016
  ident: ref_53
  article-title: A chaos-based image encryption algorithm with simple logical functions
  publication-title: Comput. Electr. Eng.
  doi: 10.1016/j.compeleceng.2015.11.008
– volume: 24
  start-page: 926
  year: 2006
  ident: ref_19
  article-title: Image encryption using chaotic logistic map
  publication-title: Image Vis. Comput.
  doi: 10.1016/j.imavis.2006.02.021
– volume: 51
  start-page: 286
  year: 1983
  ident: ref_22
  article-title: The Fractal Geometry of Nature
  publication-title: Am. J. Phys.
  doi: 10.1119/1.13295
– volume: 153
  start-page: 11
  year: 2018
  ident: ref_18
  article-title: Image encryption using 2D Hénon-Sine map and DNA approach
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2018.06.008
– volume: 229
  start-page: 120716
  year: 2021
  ident: ref_39
  article-title: A multivariate grey prediction model based on energy logistic equation and its application in energy prediction in China
  publication-title: Energy
  doi: 10.1016/j.energy.2021.120716
– volume: 190
  start-page: 116193
  year: 2022
  ident: ref_42
  article-title: Robust image encryption and zero-watermarking scheme using SCA and modified logistic map
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2021.116193
– ident: ref_5
  doi: 10.1007/3-540-48910-X
– volume: 28
  start-page: 656
  year: 1949
  ident: ref_46
  article-title: Communication Theory of Secrecy Systems
  publication-title: Bell Syst. Tech. J.
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– volume: 109
  start-page: 119
  year: 2015
  ident: ref_56
  article-title: A RGB image encryption algorithm based on total plain image characteristics and chaos
  publication-title: Signal Process.
  doi: 10.1016/j.sigpro.2014.10.033
– ident: ref_49
  doi: 10.3390/computation11090178
– volume: 71
  start-page: 100786
  year: 2023
  ident: ref_35
  article-title: Privacy-preserving set-based estimation using partially homomorphic encryption
  publication-title: Eur. J. Control
  doi: 10.1016/j.ejcon.2023.100786
– volume: 11
  start-page: 11541
  year: 2023
  ident: ref_50
  article-title: Color Image Encryption Through Chaos and KAA Map
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2023.3242311
– ident: ref_25
  doi: 10.3390/fractalfract6020089
– ident: ref_6
– volume: 36
  start-page: 100235
  year: 2020
  ident: ref_33
  article-title: Homomorphic encryption systems statement: Trends and challenges
  publication-title: Comput. Sci. Rev.
  doi: 10.1016/j.cosrev.2020.100235
– volume: 34
  start-page: 8136
  year: 2022
  ident: ref_4
  article-title: A chaos-based block cipher based on an enhanced logistic map and simultaneous confusion-diffusion operations
  publication-title: J. King Saud Univ. Comput. Inf. Sci.
– ident: ref_1
  doi: 10.1145/3549993
– volume: 232
  start-page: 120811
  year: 2023
  ident: ref_55
  article-title: Target-based Image Encryption via Infinite Interval Chaotic System with Ill-conditioned Parameter and 3DBDM
  publication-title: Expert Syst. Appl.
  doi: 10.1016/j.eswa.2023.120811
– volume: 121
  start-page: 463
  year: 2023
  ident: ref_10
  article-title: Dynamic analysis of HR-FN-HR neural network coupled by locally active hyperbolic memristors and encryption application based on knuth-Durstenfeld algorithm
  publication-title: Appl. Math. Model.
  doi: 10.1016/j.apm.2023.05.004
– volume: 592
  start-page: 1
  year: 2022
  ident: ref_27
  article-title: An image encryption algorithm based on new generalized fusion fractal structure
  publication-title: Inf. Sci.
  doi: 10.1016/j.ins.2022.01.042
– ident: ref_17
  doi: 10.3390/math11030767
– ident: ref_9
  doi: 10.3390/app13064034
– volume: 39
  start-page: 131
  year: 1922
  ident: ref_21
  article-title: Mémoire sur la permutabilité des fractions rationnelles
  publication-title: Ann. Sci. De L’école Norm. Supérieure
  doi: 10.24033/asens.740
– volume: 69
  start-page: 3320
  year: 2022
  ident: ref_16
  article-title: Spiral-transform-based fractal sorting matrix for chaotic image encryption
  publication-title: IEEE Trans. Circuits Syst. I Regul. Pap.
  doi: 10.1109/TCSI.2022.3172116
– volume: 77
  start-page: 265
  year: 1987
  ident: ref_8
  article-title: The fractal nature of geographic phenomena
  publication-title: Ann. Assoc. Am. Geogr.
  doi: 10.1111/j.1467-8306.1987.tb00158.x
– volume: 34
  start-page: 7824
  year: 2023
  ident: ref_11
  article-title: Design and Analysis of Multiscroll Memristive Hopfield Neural Network With Adjustable Memductance and Application to Image Encryption
  publication-title: IEEE Trans. Neural Netw. Learn. Syst.
  doi: 10.1109/TNNLS.2022.3146570
– ident: ref_41
  doi: 10.3390/app13127113
SSID ssj0023216
Score 2.3828926
Snippet Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today’s digital era. This paper introduces...
Protecting digital data, especially digital images, from unauthorized access and malicious activities is crucial in today's digital era. This paper introduces...
SourceID doaj
proquest
gale
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
StartPage 1478
SubjectTerms Algorithms
Chaos theory
Confidentiality
Cryptography
Data encryption
Data integrity
Digital data
Digital imaging
fractal
Fractals
image encryption
Image enhancement
Paillier encryption
Parameter estimation
Prime numbers
Privacy
Processing speed
Security
Self-similarity
Sierpinski triangle
Trends
Triangles
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT9wwELUqTlxQq4JIC5VBSPRARGI7TtzbglgtSPTQFomb5Y9xqQTJCpYD_74zSXZFJSouKKfEk9iZiTPzEs8bxg6g9NI1yuSxLk2uXKVybxJOvKRNRSvH60TZyJff9exKXVxX189KfdGasIEeeFDcsTcqalfqOrioCm-cknXpRULXLRTInucTfd4STI1QS4pSDzxCEkH9MVAgjf02_3ifnqT_f6_i3r9M37ONMTDkk2FAH9g7aD-y-ZSSmNxtfoLOJvLZE-VX8dP7p_miGziYv_Gz9oY4M9rf_PwOXw64H6gd9c3pIyv_8XNyxGfdHW6o0z_hmcARdy1e7sZ12Cm_dPOHTXY1Pft1OsvHGgl5ULJY5KKKGGPFoqqiURhqNLEGSMo7UAEI_mkBKSZiBQsy6cYFCM7hOU5qaEKSW2yt7VrYZtyDkFF4pUxK6OZjAyoWAmQIonACIGNfl7qzYSQQpzoWtxaBBKnZrtScsf2V6HxgzXhJ6IQMsBIgouv-AJrfjua3r5k_Y4dkPkvTEQcT3JhVgLdExFZ2UlOIhJiyzNjO0sJ2nKcPFuEm-nBTNTpje6tmnGH028S10D0OMgjjUYOf3mLEn9k6lawf8hl32Nri_hF2MbBZ-C_9M_wXZcz2HA
  priority: 102
  providerName: Directory of Open Access Journals
Title Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps
URI https://www.proquest.com/docview/2893039586
https://www.proquest.com/docview/2893837360
https://doaj.org/article/b94d6a167cad40b9a4371b2f25024e33
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3da9swEBdr-7KXsbGNeeuCWgbbQ01tSf7qy0hK0mzQMroV8mZk6dQWWttL0of-972zFXeDdRgMts6SffKd7iTd7xj7BHElda6K0GZxESqdqLAqHAqeS4uEdo5njqKRT8_S-YX6vkgWfsJt5bdVbnRip6htY2iO_BAdA9S2RZKnX9vfIWWNotVVn0Jji-2gCs7R-dqZTM9-nA8ulxRx2uMJSXTuD4EMamw__2sU6sD6n1LJ3Tgze8leeAORj_sefcWeQf2atTMKZtI34QQHHcvn9xRnxY-X9-266bGYj_i0viLsjPqSf7tFJYHXhsqR75wmW_n5z_EBnze3eCBvr80fBAdc11jdlW6wUX6q29UbdjGb_jqehz5XQmiUjNahSCzaWjZKElsoNDlymwE4VWlQBsgNTAU46wgdzEiX5tqA0Rqf0TKF3Dj5lm3XTQ3vGK9ASCsqpQrncLi3OSgbCZDGiEgLgIB92fCuNB5InPJZ3JToUBCby4HNAdsfSNsePeNfRBPqgIGAAK-7G83ysvTyU1aFsqmO08xoq6Kq0EpmcSUcWnBCgZQB-0zdV5JY4ssY7aML8JMI4KocZ2QqoW8ZB2x308Oll9dV-fh3BWxvKEZJo-UTXUNz19OgO48cfP__Kj6w55SUvo9Y3GXb6-UdfETTZV2N2FY-Oxn5v3TUTQDg-WQRPwCVP_JN
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtR3LbtQw0CrlABcEAsRCCwaB4NCoie08jITQtnTJ0m4P0Eq9GcePtlKbhN2t0P4U38hMXoAE3KqcEk-ceN6TeGYIeemigutMyMCmkQyEjkVQSA-C5xMZ487x1GM28uwwyY_Fp5P4ZI386HNhcFtlrxMbRW0rg9_ItyEwAG0r4yx5X38LsGsU_l3tW2i0bLHvVt8hZFu8m34A-r5ibLJ3tJsHXVeBwAgeLgMWW_BKbBjHVgowzplNnfOi0E4YhwFTwpy3HutoGe6TTBtntIZ7NE9cZjyHeW-Qm4JziRKVTT4OAR5nUdJWL4LBcNuh-w6rzf6weU1rgH8ZgMaqTe6SO507Ssct_9wja668T-oJpk7pi2AHTJyl-QqzuujufFUvq7by81u6V55hpY7ylE4vQSXBucFxoDLFT7v085fxFs2rSziAkufmN4AtqkuY7kxX8FA60_XiATm-Fhw-JOtlVbpHhBaOccsKIaT34FzYzAkbMseNYaFmzo3Imx53ynRly7F7xoWC8AXRrAY0j8iLAbRua3X8DWgHCTAAYHnt5kI1P1WdtKpCCpvoKEmNtiIspBY8jQrmwV9kwnE-Iq-RfAqVALyM0V0uAywJy2mpcYqOGUSy0Yhs9BRWnXZYqF-8PCLPh2GQa_xZo0tXXbUwGU8Bg4__P8Uzcis_mh2og-nh_hNymwEbtrmSG2R9Ob9ym-A0LYunDadS8vW6ReMnRYkszA
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtR1db9Mw0BqdhHhBIEAUBhgEgodFTWznw0gItVurlrFqGkzam3H8sSFtSWg7of41fh13zQcgAW9TnpJcnPi-L_bdEfLSRTnXmZCBTSMZCB2LIJceBM8nMsad46nHbOTDeTI9ER9O49Mt8qPNhcFtla1O3ChqWxr8Rz6AwAC0rYyzZOCbbRFH-5P31bcAO0jhSmvbTqNmkQO3_g7h2_LdbB9o_Yqxyfjz3jRoOgwERvBwFbDYgodiwzi2UoChzmzqnBe5dsI4DJ4S5rz1WFPLcJ9k2jijNTyjeeIy4zmMe4NspxAVhT2yPRrPj467cI-zKKlrGXEuw4FDZx7mnv1hATeNAv5lDjY2bnKH3G6cUzqsueku2XLFPVJNMJFKXwQjMHiWTteY40X3FutqVdZ1oN_ScXGOdTuKMzq7BAUF5wbvA80p_uilx5-Gu3RaXsIBdP1qfgPYpbqA4c51CS-lh7pa3icn14LFB6RXlIV7SGjuGLcsF0J6D66GzZywIXPcGBZq5lyfvGlxp0xTxBx7aVwoCGYQzapDc5-86ECrunLH34BGSIAOAIttby6UizPVyK7KpbCJjpLUaCvCXGrB0yhnHrxHJhznffIayadQJcDHGN1kNsCUsLiWGqbopkFcG_XJTkth1eiKpfrF2X3yvLsNUo5LN7pw5VUNk_EUMPjo_0M8IzdBLNTH2fzgMbnFgAvrxMkd0lstrtwT8KBW-dOGVSn5ct3S8RMAxTJe
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Fractal-Based+Hybrid+Cryptosystem%3A+Enhancing+Image+Encryption+with+RSA%2C+Homomorphic+Encryption%2C+and+Chaotic+Maps&rft.jtitle=Entropy+%28Basel%2C+Switzerland%29&rft.au=Dani+Elias+Mfungo&rft.au=Fu%2C+Xianping&rft.date=2023-11-01&rft.pub=MDPI+AG&rft.eissn=1099-4300&rft.volume=25&rft.issue=11&rft.spage=1478&rft_id=info:doi/10.3390%2Fe25111478&rft.externalDBID=HAS_PDF_LINK
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1099-4300&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1099-4300&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1099-4300&client=summon