2010
DOI: 10.1007/s11042-010-0652-6
|View full text |Cite
|
Sign up to set email alerts
|

A novel image cipher based on mixed transformed logistic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
45
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 72 publications
(46 citation statements)
references
References 12 publications
1
45
0
Order By: Relevance
“…The permutation is achieved by scrambling all the pixels as a whole using 2D chaotic maps [1,10,11]. In diffusion stage, the pixel values are altered sequentially and the change made to a particular pixel depends on the accumulated effect of all the previous pixel values.…”
Section: Literature Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…The permutation is achieved by scrambling all the pixels as a whole using 2D chaotic maps [1,10,11]. In diffusion stage, the pixel values are altered sequentially and the change made to a particular pixel depends on the accumulated effect of all the previous pixel values.…”
Section: Literature Surveymentioning
confidence: 99%
“…To resist brute-force attacks the key space is increased by using multiple chaotic maps in [1,10,7]. Shatheesh Sam [2] proposed image encryption based on intertwining chaotic maps to enhance security and keylength.…”
Section: Literature Surveymentioning
confidence: 99%
“…The permutation is achieved by scrambling all the pixels as a whole using 2D chaotic map (such as Baker map, Arnold cat map etc.) [3,4,10,12]. During diffusion, the pixel values are modified sequentially and the change made to a particular pixel depends on the accumulated effect of all the previous pixel values.…”
Section: Literature Surveymentioning
confidence: 99%
“…Guodong Ye [1] proposed an image encryption scheme with generalized Arnold map, as the key stream depends on the processed image the method can resist known-and chosen-plain text attacks. To solve the problem of small key space multiple chaotic maps were used in [2,3,6]. Yanbing Liu [5] suggested energy efficient chaotic block cipher suitable for wireless sensor networks.…”
Section: Literature Surveymentioning
confidence: 99%
“…In order to facilitate secret communication, image encryption has found a significant place in both public and private services such as military surveillance, satellite information systems, health-care, meteorology, confidential video conferencing, personal photograph album, internet banking transactions, multimedia systems, telemedicine, and medical imaging systems [4]- [9]. A cryptographic algorithm, or cipher, is a mathematical function used in the encryption and decryption process.…”
Section: Introductionmentioning
confidence: 99%