2020
DOI: 10.3390/jimaging6070070
|View full text |Cite
|
Sign up to set email alerts
|

A New Composite Fractal Function and Its Application in Image Encryption

Abstract: Fractal’s spatially nonuniform phenomena and chaotic nature highlight the function utilization in fractal cryptographic applications. This paper proposes a new composite fractal function (CFF) that combines two different Mandelbrot set (MS) functions with one control parameter. The CFF simulation results demonstrate that the given map has high initial value sensitivity, complex structure, wider chaotic region, and more complicated dynamical behavior. By considering the chaotic properties of a fractal, an image… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 50 publications
0
4
0
Order By: Relevance
“… Agarwal (2020) presented the CFF technique, composite fractal function (CFF) is the combination of two distant Mandelbrot sets having a single threshold value. A z-scanned fractal pattern is used for increasing randomness in the image by applying random fractal matrix and Henon map-based plain image pixel scrambling.…”
Section: Literature Reviewmentioning
confidence: 99%
“… Agarwal (2020) presented the CFF technique, composite fractal function (CFF) is the combination of two distant Mandelbrot sets having a single threshold value. A z-scanned fractal pattern is used for increasing randomness in the image by applying random fractal matrix and Henon map-based plain image pixel scrambling.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There are also images that contain sensitive information such as military secrets, commercial information, and government documents. Moreover, when images are transmitted in public networks, security threats such as interception, tampering, and copying may be encountered [ 1 , 2 , 3 , 4 ]. Therefore, the image security issue has attracted more and more attention from scholars.…”
Section: Introductionmentioning
confidence: 99%
“…With the development of the Internet and multimedia technology, more and more image information is transmitted on the network. Because images contain a lot of information with intuitive visual effects, they have gradually become an important information carrier in social interactions [1][2][3][4]. At the same time, images also play an important role in the fields of medicine, military, and aerospace [5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%