2005
DOI: 10.1016/j.chaos.2004.11.096
|View full text |Cite
|
Sign up to set email alerts
|

A block cipher based on a suitable use of the chaotic standard map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
202
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 362 publications
(203 citation statements)
references
References 13 publications
1
202
0
Order By: Relevance
“…On the other hand, chaotic system has attracted tremendous interest from researchers thanks to its good features, such as ergodicity, pseudo-randomness and sensitivity to initial conditions and control parameters, which are in line with the basic requirements, like confusion and diffusion, in cryptography [2,3]. These good chaotic properties make chaotic systems potential for constructing cryptosystems in multimedia field [3][4][5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, chaotic system has attracted tremendous interest from researchers thanks to its good features, such as ergodicity, pseudo-randomness and sensitivity to initial conditions and control parameters, which are in line with the basic requirements, like confusion and diffusion, in cryptography [2,3]. These good chaotic properties make chaotic systems potential for constructing cryptosystems in multimedia field [3][4][5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…The idea can also be expanded to the color space and frequency domain. Many image shuffling schemes have been proposed in the literature, such as Arnold map, Baker map, Standard map, Fibonacci-Q transform, Conway game, automata cellular [4][5][8][9][10][11]. In this paper, two novel image shuffling schemes are proposed according to orbits of the chaotic Standard map.…”
Section: Introductionmentioning
confidence: 99%
“…The security issue of digital images has attracted more attentions consequently. To meet the demand of real-time secure image transmission, a variety of encryption algorithms (for example, see [1][2][3][4][5][6][7][8][9][10] and the references therein) have been studied and developed. Among them, chaos-based encryption algorithms have been considered to be a significant technique in application thanks to the good properties of chaotic systems in many concerned aspects regarding security, complexity, speed, computing power and computational overhead, etc.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid growth of multimedia production systems, electronic publishing and widespread dissemination of digital multimedia data over the Internet, protection of digital information against illegal copying and distribution has become extremely important [1,4,5,8]. To meet this challenge, a variety of encryption schemes have been illustrated [2,3,7,11,14].…”
Section: Introductionmentioning
confidence: 99%