2020
DOI: 10.1007/s11042-020-10117-y
|View full text |Cite
|
Sign up to set email alerts
|

A novel 1D chaotic system for image encryption, authentication and compression in cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 50 publications
0
7
0
Order By: Relevance
“…Reference 13 merged to the logistic tent sine chaotic map (LTSS), and it is recommended for its better chaotic behaviors and larger confused ranges rather than simple form of one-dimensional (1D) confusing map, such as a logistic chaotic map. Followed by this, the LTSS chaotic structure is leveraged for image protection mechanism in the cloud that consists of three parts, namely cloud services, data user, and data owner.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Reference 13 merged to the logistic tent sine chaotic map (LTSS), and it is recommended for its better chaotic behaviors and larger confused ranges rather than simple form of one-dimensional (1D) confusing map, such as a logistic chaotic map. Followed by this, the LTSS chaotic structure is leveraged for image protection mechanism in the cloud that consists of three parts, namely cloud services, data user, and data owner.…”
Section: Literature Reviewmentioning
confidence: 99%
“…2. Permutation coordinate A(m, n) of matrix A(i, j) is calculated as follows: m = (Z(i, j) + Sum row (i))modM n = (W(i, j) + Sum col (j))modN (28) 3. If the calculation is m = i or n = j, the permutation position coordinates of the element are recalculated according to…”
Section: Plaintext-related Scramblingmentioning
confidence: 99%
“…To solve this problem, some researchers use chaotic mapping to design measurement matrices [25][26][27][28][29]. The initial values and parameters of the chaotic maps are used as keys, which greatly reduces the required storage space.…”
Section: Introductionmentioning
confidence: 99%
“…Second, 5 paths involve CLOUD's evolution to AUTHENTICATION. Users should first conduct identity authentication for cloud data users and then obtain the required services from the Cloud [140]. And in 2020, the research on authentication has expanded to multiple aspects such as mutual authentication [89], authentication scheme [141] and fog computing [142].…”
Section: ) Cloudmentioning
confidence: 99%