2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA) 2018
DOI: 10.1109/iceca.2018.8474891
|View full text |Cite
|
Sign up to set email alerts
|

A Chaos Based Image Encryption Using Tinkerbell Map Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…The more the difference between the pixel values, the more will be the contrast in the image. To achieve (a) Plain Cameraman image (b) Encrypted image using encryption scheme proposed in [16] (c) Encrypted image using encryption scheme proposed in [20] (d) Single S-box encryption (e) Encrypted image using encryption scheme proposed in [25] (f) Encrypted image using encryption scheme proposed in [26] (g) Encrypted image using encryption scheme proposed in [27] (h) Encrypted image using encryption scheme proposed in [28] (i) Encrypted image using encryption scheme proposed in [29] FIGURE 3: Encrypted images using exiting schemes. better security, we always required higher values of contrast.…”
Section: ) Contrastmentioning
confidence: 99%
See 1 more Smart Citation
“…The more the difference between the pixel values, the more will be the contrast in the image. To achieve (a) Plain Cameraman image (b) Encrypted image using encryption scheme proposed in [16] (c) Encrypted image using encryption scheme proposed in [20] (d) Single S-box encryption (e) Encrypted image using encryption scheme proposed in [25] (f) Encrypted image using encryption scheme proposed in [26] (g) Encrypted image using encryption scheme proposed in [27] (h) Encrypted image using encryption scheme proposed in [28] (i) Encrypted image using encryption scheme proposed in [29] FIGURE 3: Encrypted images using exiting schemes. better security, we always required higher values of contrast.…”
Section: ) Contrastmentioning
confidence: 99%
“…percentage loss of information after the cropping attack on cipher text images. Ref[26] Ref[27] Ref[28] Ref [29] schemes encryption Contrast 9.9970 8.9650 8.4130 10.3573 11.3587 10.9876 9.6382 10.8938 values…”
mentioning
confidence: 99%
“…Creative results uncover that their strategy cannot simply create start to finish picture change procedure. In [7], He proposed a power-capable picture-changing method for WSNs that fuses wave-based image disruption as a cooperative transmission. With this method the authors use a mixture of SDF (particularly decisive and so forth), so the transmission hub collaborates through converting only a minor-target class of the actual picture by connecting it with the source, obtained by DWT Has been done, that is, discrete wave transforms.…”
Section: Related Workmentioning
confidence: 99%
“…Each hand-off hub moves as either an RR hub or MR hub during picture transmission measurement. The square space is demonstrated by the DF technique using positions (7) and (8). The DF technique can provide the location capability as follows: f_DF (OSR)=rˆ (2) rˆ refers to the identified or decoded information at the transfer hub, OSR addresses the first information from S to recipient R for work f_DF.…”
Section: Return Awgn Effected (I_1 To I_4)mentioning
confidence: 99%
See 1 more Smart Citation