2017
DOI: 10.2991/ijndc.2017.5.1.4
|View full text |Cite
|
Sign up to set email alerts
|

A New Chaos-based Image Cipher Using a Hash Function

Abstract: This paper presents a new chaos-based image cipher using a plaintext-related permutation. The cat map and Lorenz system are employed to shuffle the positions of image pixels and generate the diffusion keystream, respectively. The control parameters of the cat map, i.e. the permutation key, are determined by the Murmur2 hash value of the original image. Owing to the avalanche property of hash functions, completely different shuffled images will be produced even if there is a tiny difference between the original… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Deoxyribonucleic acid sequence (DNA) technology applied in the cryptography domain to enhance efficiency and security of hyperchaotic encryption schemes, the biological operations and algebra operations in DNA encoding and DNA computing is the main reason of using DNA techniques [5]. In the field of encryption, many algorithms and auxiliary functions used to build cryptographic systems such as Message-Digest Algorithm 5 (MD5) which define as a one of cryptographic hash functions which processes variable-length or the message and convert into a fixed 128-bit output [6]. The rest of this paper is organized as follows.…”
Section: Issn: 0067-2904mentioning
confidence: 99%
See 1 more Smart Citation
“…Deoxyribonucleic acid sequence (DNA) technology applied in the cryptography domain to enhance efficiency and security of hyperchaotic encryption schemes, the biological operations and algebra operations in DNA encoding and DNA computing is the main reason of using DNA techniques [5]. In the field of encryption, many algorithms and auxiliary functions used to build cryptographic systems such as Message-Digest Algorithm 5 (MD5) which define as a one of cryptographic hash functions which processes variable-length or the message and convert into a fixed 128-bit output [6]. The rest of this paper is organized as follows.…”
Section: Issn: 0067-2904mentioning
confidence: 99%
“…The researcher considered this scheme insecure if the shape pattern or color of just a portion of the secret image can be recovered from any given share. Fu C. et al [6] developing the chaos-based image cipher based on permutation the plain text and change the positions of image pixels. The diffusion keystream generated of the cat map and Lorenz system.…”
Section: Related Workmentioning
confidence: 99%
“…images require more time for encryption processing since image files are larger than text files; key sensitivity; and the decryption by conventional algorithms must be exactly identical to the real image. Multimedia systems have their own properties, such as large data sets, high pixel correlation and very high data frequency, which can eliminate the efficiency of encryption methods [2,3].…”
Section: Introductionmentioning
confidence: 99%