2021
DOI: 10.1109/access.2021.3073514
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Color Image Encryption Algorithm Based on Three-Dimensional Chaotic Maps and Reconstruction Techniques

Abstract: In the paper, a novel color image encryption scheme is proposed by use of the threedimensional chaotic maps and some data reconstruction techniques. In the diffusion process of the encryption algorithm, the three-dimensional chaotic Logistic map is introduced to changes the pixel value of the plain image. Meanwhile, in the confusion process, the three-dimensional chaotic Cat map is applied to deal with the position of the image pixels. Moreover, some data reconstruction techniques are employed for the better e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 54 publications
(19 citation statements)
references
References 40 publications
0
14
0
Order By: Relevance
“…• Three-dimensional Many image encryption algorithms utilize three-dimensional chaos. One such algorithm was proposed by Qian et al [89], where they utilized the 3D logistic and cat maps. The novel usage of image reconstruction techniques also improved the effectiveness of the algorithm.…”
Section: Chaos Dimensionmentioning
confidence: 99%
“…• Three-dimensional Many image encryption algorithms utilize three-dimensional chaos. One such algorithm was proposed by Qian et al [89], where they utilized the 3D logistic and cat maps. The novel usage of image reconstruction techniques also improved the effectiveness of the algorithm.…”
Section: Chaos Dimensionmentioning
confidence: 99%
“…2022 is effective at repelling the entropy attack. If the entropy is significantly less than the maximum value, however, the encoded image is ineffective and cannot withstand an entropy attack [24][25][26][27]. The following formula is used to calculate entropy:…”
Section: Examination Of Information Entropymentioning
confidence: 99%
“…During the digital transmission process of data through public channels, the data is exposed to be missed. Stolen password of image is applied by data loss attack in which the attackers seek to remove parts of the data [45]. So, various data loss sizes were made to test the level of enciphered images' recovery.…”
Section: Occlusion Attackmentioning
confidence: 99%