2011
DOI: 10.1007/978-3-642-17881-8_28
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Image Encryption Algorithm Using Two Chaotic Maps for Medical Application

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…The cipher image is obtained by XORing the image pixels with the iterated hyperchaotic sequences. In [20], Sathish Kumar et al suggested the dual chaos based medical image encryption algorithm, where the shuffling and scrambling are done through chaotic circular shifting. In [21], a tri layer cryptic system based on Latin square image cipher, Rubik's cube and discrete Gould transform has been designed to shuffle, scramble and authenticate the DICOM.…”
Section: Introductionmentioning
confidence: 99%
“…The cipher image is obtained by XORing the image pixels with the iterated hyperchaotic sequences. In [20], Sathish Kumar et al suggested the dual chaos based medical image encryption algorithm, where the shuffling and scrambling are done through chaotic circular shifting. In [21], a tri layer cryptic system based on Latin square image cipher, Rubik's cube and discrete Gould transform has been designed to shuffle, scramble and authenticate the DICOM.…”
Section: Introductionmentioning
confidence: 99%
“…But because of its structure simplicity, these encryption techniques can easily be cryptanalyzed by many methods such as phase regression image, space reconstruction, or nonlinear prediction. As a result of the emergence of the multi-dimensional image processing technologies, and multivariable networks, the cryptosystem's designers developed multi-dimensional chaos-based image cryptosystems [8], hyper-chaos-based image cryptosystems [36]. However, these image cryptosystems have been cryptanalyzed and demonstrated insecurity and they also exposed some inner flaws [2,8,21,23,34,35,39].…”
Section: Introductionmentioning
confidence: 98%
“…In this technique, the circular shifting of rows and columns has been controlled through the logistic and Bernoulli chaotic maps. Scrambling followed by the diffusion enables the method stronger against statistical attacks [12]. Combining multiple chaotic maps can provide more robust encryption which also improves confidentiality.…”
Section: Introductionmentioning
confidence: 99%