Search alternatives:
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search), selection algorithm (Expand Search)
generation algorithm » genetic algorithm (Expand Search), detection algorithm (Expand Search), selection algorithm (Expand Search)
-
1
-
2
Comparison result of the encryption efficiency required by different encryption algorithms for the Female image at varying sizes.
Published 2025“…<p>Comparison result of the encryption efficiency required by different encryption algorithms for the Female image at varying sizes.…”
-
3
-
4
-
5
-
6
-
7
-
8
-
9
Comparative analysis of correlation coefficients across different encryption schemes.
Published 2025Subjects: -
10
Images after encryption: (a) Hailstones image; (b) Flowers image; (c) Chair image; (d) Bride image.
Published 2025Subjects: -
11
Encryption speed of the proposed technique and its comparative analysis with existing methods.
Published 2025Subjects: -
12
-
13
-
14
-
15
-
16
Encrypted and decrypted images.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
17
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
18
Comparison of NPCR among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
19
-
20