2016
DOI: 10.1007/s13319-016-0084-9
|View full text |Cite
|
Sign up to set email alerts
|

A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
33
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 58 publications
(33 citation statements)
references
References 20 publications
0
33
0
Order By: Relevance
“…The computation of multiple S-boxes takes more time than computing only one S-box. Similarly the techniques in [ 2 , 27 ] use a set of S-boxes and encrypt an image in blocks, while our newly developed scheme encrypts the whole image using only one dynamic S-box. Thus, our scheme is faster than the schemes in [ 2 , 27 ].…”
Section: Security Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…The computation of multiple S-boxes takes more time than computing only one S-box. Similarly the techniques in [ 2 , 27 ] use a set of S-boxes and encrypt an image in blocks, while our newly developed scheme encrypts the whole image using only one dynamic S-box. Thus, our scheme is faster than the schemes in [ 2 , 27 ].…”
Section: Security Analysismentioning
confidence: 99%
“…Similarly the techniques in [ 2 , 27 ] use a set of S-boxes and encrypt an image in blocks, while our newly developed scheme encrypts the whole image using only one dynamic S-box. Thus, our scheme is faster than the schemes in [ 2 , 27 ]. The security system in [ 61 ] uses a chaotic system to encrypt blocks of an image.…”
Section: Security Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Some other more efficient algorithms could be reviewed in [6,[16][17][18][19][20]. In addition to this, applications of -boxes in digital image encryption, steganography, and watermarking have become quite popular and influential in recent years [4,11,13,21].…”
Section: Introductionmentioning
confidence: 99%
“…In 1989, Mathews presented the concept of chaotic encryption (Matthews, 1984). Following Mathew's novel idea, many researchers have turned their attention towards chaos-based image encryption and S-box construction techniques Anees et al, 2014a;Khan et al, 2015a;Younas and Ahmad, 2014;Anees et al, 2014b;Dawei et al, 2004;Huang and Guan, 2005;Li and Zheng, 2002;Ahmad and Ahmed, 2010;Rehman et al, 2016;Khan et al, 2015b;Habib et al, 2017). These chaos-based image encryption algorithms have lots of merits, such as the large key space, ergodicity and sensitivity to the secret keys.…”
Section: Introductionmentioning
confidence: 99%