2019
DOI: 10.1109/access.2019.2921309
|View full text |Cite
|
Sign up to set email alerts
|

A Chaos-Based Image Encryption Technique Utilizing Hilbert Curves and H-Fractals

Abstract: Image encryption is the most direct and effective technical means for protecting the security of image information. Based on the space filling property of the Hilbert curve and the infinite property of the H-geometric fractal, a new image encryption technique is proposed, which combines the pseudorandomness of a hyperchaotic system and the sensitivity to initial values. First, the hash value of a plaintext image is calculated using the secure hash algorithm 3 (SHA-3) as the initial value of the piece-wise line… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
32
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 69 publications
(34 citation statements)
references
References 53 publications
1
32
0
1
Order By: Relevance
“…where k ∈ [10,24] is a control parameter and F refers to a chaotic map. We select k in the range [10,24] for two reasons: Firstly, when the angle of the cosine function is sufficiently large, even small differences in F(x n ) will lead to wildly diverging outputs. For example, if the angle is small, the difference between cos(2 1 ) = −0.416146836 and cos(2 1+0.00001 ) = −0.416159442 is small.…”
Section: Cosine-based Digital Chaotic Mapsmentioning
confidence: 99%
See 1 more Smart Citation
“…where k ∈ [10,24] is a control parameter and F refers to a chaotic map. We select k in the range [10,24] for two reasons: Firstly, when the angle of the cosine function is sufficiently large, even small differences in F(x n ) will lead to wildly diverging outputs. For example, if the angle is small, the difference between cos(2 1 ) = −0.416146836 and cos(2 1+0.00001 ) = −0.416159442 is small.…”
Section: Cosine-based Digital Chaotic Mapsmentioning
confidence: 99%
“…Chaotic systems have many desirable features such as sensitivity to initial conditions and parameters, ergodicity, topological transitivity mixing, unpredictability, and aperiodic dense orbits. Thus, chaotic systems have been broadly used in a number of areas such as secure communication [5], engineering [6], and cryptographic applications [7]- [10]. There are many commonalities between chaotic systems and cryptographic algorithms such as key sensitivity (parameter sensitivity), uniform data distribution (ergodicity), random-like behavior (chaoticity) and many more.…”
Section: Introductionmentioning
confidence: 99%
“…Bit-level permutation [19][20][21], and (2). Pixel-based permutation [22][23][24]. A bit is considered as the smallest operating element.…”
Section: Introductionmentioning
confidence: 99%
“…in hosiery and grocery) to design on coffee cups, jugs, bed sheets and shirts. The fractals found many applications in image encryption [8] or compression [9], cryptography [10], art and design [11] due to their unique and self-similar behavior. There are many applications of fractals in electrical and electronics engineering presented in [12].…”
Section: Introductionmentioning
confidence: 99%