2014
DOI: 10.1007/s11071-014-1492-0
|View full text |Cite
|
Sign up to set email alerts
|

A fast color image encryption algorithm based on hyper-chaotic systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
63
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 136 publications
(68 citation statements)
references
References 50 publications
1
63
1
Order By: Relevance
“…The permutation and substitution processes can be used in spatial based image encryption algorithms like Data Encryption Standard (DES) [15], Advanced Encryption Standard (AES) [23], Rivest, Shamir and Adleman (RSA) [24], P-Fibonacci transform [25], wave transmission [26], elliptic curve ElGamal [27], gray code [28], random grids [29], Latin squares [30] and chaotic mapping [31].…”
Section: Related Workmentioning
confidence: 99%
“…The permutation and substitution processes can be used in spatial based image encryption algorithms like Data Encryption Standard (DES) [15], Advanced Encryption Standard (AES) [23], Rivest, Shamir and Adleman (RSA) [24], P-Fibonacci transform [25], wave transmission [26], elliptic curve ElGamal [27], gray code [28], random grids [29], Latin squares [30] and chaotic mapping [31].…”
Section: Related Workmentioning
confidence: 99%
“…[4][5][6][7]. all of image encryption schemes can be essentially categorized into three different types which are: pixels value conversion, permutation of pixel position and finally integration of them [8].…”
Section: Introductionmentioning
confidence: 99%
“…[8,9] Commonly, the chaotic system have fast with minimal costs, making it better than most traditional methods which are used to encrypt digital images [6]. In the subsequent paragraphs, will provide a brief explanation of some significant improvements that have been occurs on image encryption methods using chaotic system.…”
Section: Introductionmentioning
confidence: 99%
“…Due to some intrinsic features of image data, such as bulk data capacity, high redundancy and high correlation among adjacent pixels, traditional cryptosystems, for example, International Data Encryption Algorithm(IDEA), Data Encryption Standard (DES), and Advanced Encryption Standard (AES), are unsuitable for image data encryption [1][2][3]. It is well known that chaos theory has many unique characteristics, such as ergodicity, pseudo randomness, sensitivity to initial conditions and control parameters [4], and these characteristics meet the requirements of diffusion and mixing in the sense of cryptography.…”
Section: Introductionmentioning
confidence: 99%