The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016 8th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) 2016
DOI: 10.1109/ecai.2016.7861097
|View full text |Cite
|
Sign up to set email alerts
|

A new image encryption algorithm based on lorenz system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…In the systems that were based on chaotic systems, key space increases by increasing the number of parameters and the chaotic system size. In this approach, the key space is (10 14 ) 6 which is nearly equal to 2 279 and it's sufficient to resist each type of brute-force attacks. Table 2 shows the key space compared to some related works.…”
Section: Key Space Analysesmentioning
confidence: 99%
See 1 more Smart Citation
“…In the systems that were based on chaotic systems, key space increases by increasing the number of parameters and the chaotic system size. In this approach, the key space is (10 14 ) 6 which is nearly equal to 2 279 and it's sufficient to resist each type of brute-force attacks. Table 2 shows the key space compared to some related works.…”
Section: Key Space Analysesmentioning
confidence: 99%
“…Qi Zhang et al [5] implemented an algorithm for image encryption based upon chaotic sequences that have been created by the Lorenz system. Kayhan C. and Erol K. [6] was proposed an innovative image encryption method based on the Lorenz chaotic system and pixel shuffling. For the pixel shuffling process, they have used two initial vectors, one of columns and another of rows.…”
Section: Introductionmentioning
confidence: 99%
“…In order to prove robust chaos encryption system, there are many tests to check. Histogram results and correlation values have shown that encryption of images can be unpredictable [23]. However, all those studies have come out a security issue that one can reach the digital data easier via internet and hardware or analog circuit-based solutions can serve better solutions, when they are used in real-time basis in order to prevent that online insecurity.In a recent study [24], Kurt and Bingol has proposed a new circuit, namely R2L2D circuit.…”
Section: Introductionmentioning
confidence: 99%