2022
DOI: 10.1155/2022/4152683
|View full text |Cite
|
Sign up to set email alerts
|

A New Image Encryption Technique Based on Sine Map, Chaotic Tent Map, and Circulant Matrices

Abstract: Image encryption is one of the sensitive areas used recently to save information over the Internet and confirms the security on a higher level. A new cryptosystem has been proposed for the encoding and decoding of images using sine map, chaotic tent map, and circulant matrices. The process involves three stages. The sine map is used for the permutation phase. In the substitution phase, the Hill cipher method together with prime circulant matrix are used and a chaotic tent map is used in the diffusion phase. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 44 publications
(43 reference statements)
0
3
0
Order By: Relevance
“…Zareai et al [17] used Logistic mapping to develop image keys, which increased the key space of the scheme, but the performance of Logistic mapping would affect the security of the algorithm to a certain extent. Kanwal et al [18] proposed an image encryption scheme based on Sine mapping and cyclic matrix; Sine mapping was used for the substitution phase of images. Kumar et al [19] applied 2D Logistic mapping to the bit-level scrambling process of RGB channels, which can effectively encrypt color images.…”
Section: Introductionmentioning
confidence: 99%
“…Zareai et al [17] used Logistic mapping to develop image keys, which increased the key space of the scheme, but the performance of Logistic mapping would affect the security of the algorithm to a certain extent. Kanwal et al [18] proposed an image encryption scheme based on Sine mapping and cyclic matrix; Sine mapping was used for the substitution phase of images. Kumar et al [19] applied 2D Logistic mapping to the bit-level scrambling process of RGB channels, which can effectively encrypt color images.…”
Section: Introductionmentioning
confidence: 99%
“…In the last few decades, the manipulation of chaos in cryptography has shown keen interest due to its major property of sensitivity to initial conditions give the form of randomness. To design efficient image encryption systems, numerous Chaos-based cryptographic models [17][18][19] have been used to develop novel methods which exhibits remarkably good features in many aspects regarding speed, cost, computational power, computational overhead, complexity, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Kanwal et al [22] used Hill cipher whose key is generated by orthogonal matrix and chaotic maps for image encryption algorithm. Kanwal et al [23]used circulant matrices for pixel shuffling. Huang and Dong [24] apply Least Significant Bit and Lifting Wavelet Transform for hiding digital signature and shuffling pixel respectively.…”
Section: Introductionmentioning
confidence: 99%