2015
DOI: 10.1016/j.neucom.2014.11.095
|View full text |Cite
|
Sign up to set email alerts
|

A novel image encryption algorithm based on chaos and Line map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
47
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 119 publications
(47 citation statements)
references
References 19 publications
0
47
0
Order By: Relevance
“…They use proxy-based additive homomorphism with reencryption to design these two schemes for Privacy-Preserving Trust Evaluation (PPTE) [34]. Zhou et al (2015) propose an encryption algorithm that focuses on image security. This algorithm is based on the Chaos stochastic process and the Line Map principle and is designed to ensure that if an image is encrypted, nothing will continue to be seen if an attempt is made to decrypt the key.…”
Section: Security Mechanisms Based Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…They use proxy-based additive homomorphism with reencryption to design these two schemes for Privacy-Preserving Trust Evaluation (PPTE) [34]. Zhou et al (2015) propose an encryption algorithm that focuses on image security. This algorithm is based on the Chaos stochastic process and the Line Map principle and is designed to ensure that if an image is encrypted, nothing will continue to be seen if an attempt is made to decrypt the key.…”
Section: Security Mechanisms Based Literature Reviewmentioning
confidence: 99%
“…This algorithm is based on the Chaos stochastic process and the Line Map principle and is designed to ensure that if an image is encrypted, nothing will continue to be seen if an attempt is made to decrypt the key. The disadvantage of this algorithm is that it can only be used for those images that have the same width and length, although the authors have carried out tests and reached the conclusion that it is a robust algorithm [35]. Hsu et al (2014) show us how to develop a protocol for the secure transfer of data and also propose a protocol for the transfer of a group key.…”
Section: Security Mechanisms Based Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Image correlation has been eliminated by combining Arnold cat map with the logistic map.To improve the performance, the substitution process was applied to permutation phase by light weight bit level shuffling method. The performance of the proposed image encryption system was measured by the time complexity, statistical attack analysis, key space analysis, key sensitivity [33]. They had proposed symmetrical image encryption algorithm based on a skew tent map which can be applied on gray level and colour images.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The paper by Zhou et al [17] addressed the problem how to ensure safety and ensure the authorization of accessing to confidential data authorization. They proposed a novel symmetrical image encryption algorithm based on skew tent map.…”
mentioning
confidence: 99%