Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
42
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 98 publications
(42 citation statements)
references
References 35 publications
0
42
0
Order By: Relevance
“…A color image encryption system based on improved genetic algorithm and matrix semi-tensor product (STP) is also proposed [19]. Peng et al proposed a discrete memristor model based on the difference theory, and proved the three fingerprint characteristics of the model according to the definition of generalized memristor [20], and based on the improved two-dimensional closed-loop modulation coupling model, proposed a new two-dimensional sinusoidal improved Logistic iterative chaotic mapping (ICMIC) modulation mapping (2D-SLIM) [21]. Chen et al in order to further improve the security under limited accuracy, proposed an improved cryptosystem based on a new two-dimensional chaotic map based on sine map, Chebyshev map and linear function (2D-SCL) [22].…”
Section: Introductionmentioning
confidence: 99%
“…A color image encryption system based on improved genetic algorithm and matrix semi-tensor product (STP) is also proposed [19]. Peng et al proposed a discrete memristor model based on the difference theory, and proved the three fingerprint characteristics of the model according to the definition of generalized memristor [20], and based on the improved two-dimensional closed-loop modulation coupling model, proposed a new two-dimensional sinusoidal improved Logistic iterative chaotic mapping (ICMIC) modulation mapping (2D-SLIM) [21]. Chen et al in order to further improve the security under limited accuracy, proposed an improved cryptosystem based on a new two-dimensional chaotic map based on sine map, Chebyshev map and linear function (2D-SCL) [22].…”
Section: Introductionmentioning
confidence: 99%
“…Since Lorenz first found the chaotic attractor in the quadratic polynomial ODEs in 1963 [1], many typical chaotic attractors including Rössler attractor [2], Chen and Ueta attractor [3], and Lü attractor [4] were discovered in many nonlinear systems [5,6] in the following decades. However, the attractors of most of them are Shilnikov type, and the corresponding systems have saddle-foci equilibria [7].…”
Section: Introductionmentioning
confidence: 99%
“…The significant correlation can persist while encoding a digital file in terms of binary sequence despite incorporating pixel characteristic as well as encryption effectiveness can still be relatively low. Consequently, various image-encoding systems were offered by numerous sorts of approaches, including magical cube [5], wavelet transform [6], [7], wave disturbance [8]and chaotic maps [9]- [12], in view of specific features of digitized images. As several scholars have indicated highlighted, although since mid-nineties numerous characteristics of chaos theory comparable to those encryption [13]- [16], analytical solutions were frequently utilized in image-based encryption but were extremely appropriate towards cryptography [17]- [19].…”
Section: Introductionmentioning
confidence: 99%