Search alternatives:
selection algorithm » detection algorithm (Expand Search), detection algorithms (Expand Search), prediction algorithms (Expand Search)
code selection » node selection (Expand Search), model selection (Expand Search), wide selection (Expand Search)
selection algorithm » detection algorithm (Expand Search), detection algorithms (Expand Search), prediction algorithms (Expand Search)
code selection » node selection (Expand Search), model selection (Expand Search), wide selection (Expand Search)
-
21
-
22
Comparison of correlation coefficients of adjacent pixels using different encryption methods.
Published 2025Subjects: -
23
Encrypted and decrypted images.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
24
-
25
Comparative analysis of correlation coefficients across different encryption schemes.
Published 2025Subjects: -
26
Images after encryption: (a) Hailstones image; (b) Flowers image; (c) Chair image; (d) Bride image.
Published 2025Subjects: -
27
Image Encryption Flow Chart.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
28
Example of shift rows encryption.
Published 2025“…Experimental results show that the proposed algorithm reduces encryption time to 2.2369 s for a 256256 grayscale image, representing an 87.08% improvement over traditional AES (17.3090 s) and a 48.41% improvement over other AES-based chaotic encryption algorithms (4.3360 s). …”
-
29
Encryption speed of the proposed technique and its comparative analysis with existing methods.
Published 2025Subjects: -
30
-
31
-
32
-
33
Experimental images&Table1-10&Figure1-15.docx
Published 2025“…<p dir="ltr">A Robust Color Image Encryption Algorithm Based on 2D-SQSM Hyperchaotic Map and Cyclic Shift Scrambling</p>…”
-
34
-
35
-
36
-
37
-
38
-
39
-
40