2018
DOI: 10.24996/ijs.2018.59.4b.17
|View full text |Cite
|
Sign up to set email alerts
|

A new Color image Encryption based on multi Chaotic Maps

Abstract: This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of 1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…The UACI and NPCR measures as shown in Table 5 are used to determine the effect on the cipher image of the change of 1 bit/pixel in the original image [24], [25].…”
Section: The Information Entropymentioning
confidence: 99%
“…The UACI and NPCR measures as shown in Table 5 are used to determine the effect on the cipher image of the change of 1 bit/pixel in the original image [24], [25].…”
Section: The Information Entropymentioning
confidence: 99%
“…The sensitivity of a cipher picture should be high before the original image or secret key is slightly changed. As in (11) and (12), UACI and NPCR measures as shown in Table 5 are used to determine the effect on the cipher image of the change of 1 bit/pixel in the original image [28], [29].…”
Section: Differential Attack Analysismentioning
confidence: 99%
“…Several recent research works are leverage chaotic system capabilities to develop the encryption algorithm, especially, the PRNG module, for example, in [10] the encryption model mixes three chaotic systems, logistic, sine, and tent maps into one system CML, the proposed chaotic system was used as a key generator of 256 bits length, furthermore, the encryption model involved a bit-level z-scan scrambler module, this scheme might rein the performance. In [11] the key generator of the encryption model has been implemented using 1D logistic and sine maps and a combination of them. For use in distributed systems, however, this study didn't consider the improvement of the chaotic parameter's range.…”
Section: Related Workmentioning
confidence: 99%