2017
DOI: 10.1109/access.2017.2692043
|View full text |Cite
|
Sign up to set email alerts
|

A novel colour image encryption scheme using rectangular transform-enhanced chaotic tent maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
116
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 102 publications
(119 citation statements)
references
References 18 publications
2
116
0
1
Order By: Relevance
“…The adjacent pixels of the original image have high correlation in the horizontal, vertical, and diagonal directions. In order to improve the resistance of statistical attacks, an ideal image encryption scheme should reduce the correlation between the two adjacent pixels [22]. The correlation coefficient can be calculated by…”
Section: Correlation Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The adjacent pixels of the original image have high correlation in the horizontal, vertical, and diagonal directions. In order to improve the resistance of statistical attacks, an ideal image encryption scheme should reduce the correlation between the two adjacent pixels [22]. The correlation coefficient can be calculated by…”
Section: Correlation Analysismentioning
confidence: 99%
“…In [13,14], another scheme is proposed to verify the randomness of the image, called "Shannon's local entropy." We also use Shannon local entropy analysis to validate our purposed scheme [15][16][17][18][19][20][21][22][23][24][25][26][27].The rest of the paper is organized as follows. Section 2 presents our designed four-dimensional chaotic system and proposed image encryption scheme.…”
mentioning
confidence: 99%
“…[24,34], but quicker than Refs. [23,35]. The algorithm proposed by Murillo et al [24] is for real-time application.…”
Section: Encryption Efficiency Analysismentioning
confidence: 99%
“…In this, the image encryption mechanism is introduced which utilizes both the CTM concept as well as rectangular transform. The security analysis of the proposed model suggests that the drawbacks of the pure CTM are eliminated [29] Also, Huang et al (2016) offer the new approach to encrypt the color image. They have given formula which uses the Logistic mapping and DRPE.…”
Section: Wu Et Al (2017)mentioning
confidence: 99%