2021
DOI: 10.1155/2021/6675565
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Hyperchaotic Image Encryption System Based on Particle Swarm Optimization Algorithm and Cellular Automata

Abstract: In this paper, we propose a hyperchaotic image encryption system based on particle swarm optimization algorithm (PSO) and cellular automata (CA). Firstly, to improve the ability to resist plaintext attacks, the initial conditions of the hyperchaotic system are generated by the hash function value which is closely related to the plaintext image to be encrypted. In addition, the fitness of PSO is the correlation coefficient between adjacent pixels of the image. Moreover, On the basis of hyperchaotic system, cell… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(36 citation statements)
references
References 64 publications
0
36
0
Order By: Relevance
“…In recent years, image and video encryption based on chaotic system has been widely studied and applied [51][52][53][54][55][56]. As the main application of chaotic system, PRNG has been paid more and more attention in the field of image encryption [57][58][59].…”
Section: Design and Implementation Of Image Encryption And Decryption System Based On Prngmentioning
confidence: 99%
“…In recent years, image and video encryption based on chaotic system has been widely studied and applied [51][52][53][54][55][56]. As the main application of chaotic system, PRNG has been paid more and more attention in the field of image encryption [57][58][59].…”
Section: Design and Implementation Of Image Encryption And Decryption System Based On Prngmentioning
confidence: 99%
“…In general, they are based on logistic [11], [12], [15], [17], [18], [21], [25], sine/cosine [23], [25], [29], memristive [24], henon [29], Chebyshev [32], coupled lattice [10] and cellular automata [31], [40]. As the cryptanalyses are compared among each other, the key-spaces in [10], [19], [22]- [24], [28], [32] can be regarded the shorter, those in [14], [18], [26], [36] are medium and those in [11], [16], [20], [21], [25], [29], [34], [35], [40], [41] are considered the longer. The mean entropy can be quantized better [20], moderate [14], [24]- [31], [41] and worse [10], [11], [15], [18], [19], [21],…”
Section: Related Studies and Comparisionmentioning
confidence: 99%
“…As the cryptanalyses are compared among each other, the key-spaces in [10], [19], [22]- [24], [28], [32] can be regarded the shorter, those in [14], [18], [26], [36] are medium and those in [11], [16], [20], [21], [25], [29], [34], [35], [40], [41] are considered the longer. The mean entropy can be quantized better [20], moderate [14], [24]- [31], [41] and worse [10], [11], [15], [18], [19], [21], [32]- [34], [40]. As the mean correlation coefficients for diagonal, horizontal and vertical directions in [11], [12], [14], [24] seem lower, those in [15], [16], [31]- [36], [40], [41], [19]- [21], [23], …”
Section: Related Studies and Comparisionmentioning
confidence: 99%
See 1 more Smart Citation
“…Chaos plays an important role in image encryption [1][2][3][4][5], secure communication [6][7][8], computer engineering [9][10], and even other fields [11][12]. The discrete chaotic map shows its potential power as a continuous chaotic system.…”
Section: Introductionmentioning
confidence: 99%