2012
DOI: 10.1016/j.image.2011.11.003
|View full text |Cite
|
Sign up to set email alerts
|

A new image encryption scheme based on a chaotic function

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
72
0
1

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 112 publications
(73 citation statements)
references
References 20 publications
0
72
0
1
Order By: Relevance
“…The others depend on the key-updating periodically such as: Chaos Block Cipher for Wireless Sensor Network (CBCW) [6] and New Encryption Algorithm for Wireless Sensor Network (NEA-WSN) [7]. Another way to encrypt the image has introduced in an algorithm denoted by New Image Encryption Scheme Based on a Chaotic Function and will be referred to by (NIES) in this paper [8]. Both CBCW and NEA-WSN enhance the performance of the security depending on the key updating with each pixel and with each row in the image respectively, while NIES deal with contents of the image as bits and change their positions inside the image many times specified by a program to determine the number of the iterations.…”
Section: Another Encryption Algorithmsmentioning
confidence: 99%
“…The others depend on the key-updating periodically such as: Chaos Block Cipher for Wireless Sensor Network (CBCW) [6] and New Encryption Algorithm for Wireless Sensor Network (NEA-WSN) [7]. Another way to encrypt the image has introduced in an algorithm denoted by New Image Encryption Scheme Based on a Chaotic Function and will be referred to by (NIES) in this paper [8]. Both CBCW and NEA-WSN enhance the performance of the security depending on the key updating with each pixel and with each row in the image respectively, while NIES deal with contents of the image as bits and change their positions inside the image many times specified by a program to determine the number of the iterations.…”
Section: Another Encryption Algorithmsmentioning
confidence: 99%
“…Guodong Ye [1] proposed an image encryption scheme with generalized Arnold map, as the key stream depends on the processed image the method can resist known-and chosen-plain text attacks. To solve the problem of small key space multiple chaotic maps were used in [2,3,6]. Yanbing Liu [5] suggested energy efficient chaotic block cipher suitable for wireless sensor networks.…”
Section: Literature Surveymentioning
confidence: 99%
“…The conventional encryption methods such as AES, DES, IDEA, RSA etc. are computationally intensive hence consume more time and are not suitable for images [4,5,6,7]. There exist several image encryption algorithms in the literature, some of these suffer with brute-force attack, statistical attack, and differential attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Because chaotic systems/maps have some intrinsic properties, such as ergodicity, sensitive to the initial condition and control parameters, which are analogous to the confusion and diffusion properties specified by Shannon [1]. Thus makes it natural to employ chaotic systems in image encryption algorithms [2][3][4][5][6][7][8][9][10][11]. Therefore, many chaotic image encryption algorithms have been developed by directly utilizing existing chaotic systems/maps [8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%