2016
DOI: 10.1016/j.image.2015.10.004
|View full text |Cite
|
Sign up to set email alerts
|

A new chaos-based image encryption system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
82
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 145 publications
(87 citation statements)
references
References 24 publications
0
82
0
Order By: Relevance
“…The generated key-streams have no dependence with respect to the characteristics of the plain-image that may lead to the non-resistance to known/chosen plain-text attacks. [22] (A new chaos-based image encryption system), the proposed scheme is based on a modified version of 2D cat map, permutation at a bit level and confusion-diffusion architecture. The proposed crypto-system belongs to the category of block ciphers with CBC mode.…”
Section: Limitationsmentioning
confidence: 99%
“…The generated key-streams have no dependence with respect to the characteristics of the plain-image that may lead to the non-resistance to known/chosen plain-text attacks. [22] (A new chaos-based image encryption system), the proposed scheme is based on a modified version of 2D cat map, permutation at a bit level and confusion-diffusion architecture. The proposed crypto-system belongs to the category of block ciphers with CBC mode.…”
Section: Limitationsmentioning
confidence: 99%
“…It is seen that the new cryptosystem is robust, faster, simpler and more secured in comparison with Ref. [2] and other chaos-based cryptosystems [1][2][3][4][5]9]. A statistical investigation is also carried out to ensure that the proposed encryption scheme is free from any brute force attack.…”
Section: Introductionmentioning
confidence: 99%
“…Encryption of optical audio or video files and digital images received renewed interests in the processes of information hiding and information security in social networks, communications, Internet such as in the segregation of the design decisions in computer programs that are like to change, thereby protecting other parts of the program from extensive modification if the design decision is changed, privacy protection, mobile or digital phones, tactical military systems to prevent transmitters being located and many more. Both the information hiding techniques and cryptography have received much attention in recent times owing to their rapid developments of digital media and digital right management systems [1][2][3][4][5][6][7][8][9]. There are many different schemes for the encryption of multimedia data like audio signal in which adding noise is one of them.…”
Section: Introductionmentioning
confidence: 99%