2016
DOI: 10.3390/e18080276
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System

Abstract: Abstract:The composite discrete chaotic system (CDCS) is a complex chaotic system that combines two or more discrete chaotic systems. This system holds the chaotic characteristics of different chaotic systems in a random way and has more complex chaotic behaviors. In this paper, we aim to provide a novel image encryption algorithm based on a new two-dimensional (2D) CDCS. The proposed scheme consists of two parts: firstly, we propose a new 2D CDCS and analysis the chaotic behaviors, then, we introduce the bit-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(20 citation statements)
references
References 39 publications
0
20
0
Order By: Relevance
“…For secure and efficient encryption, composite chaotic encryption algorithms have been created [15][16][17], either coupling low-and high-dimensional chaos or integrating lowand hyper-dimensional chaos. Two or more chaotic systems can complement each other.…”
Section: Literature Reviewmentioning
confidence: 99%
“…For secure and efficient encryption, composite chaotic encryption algorithms have been created [15][16][17], either coupling low-and high-dimensional chaos or integrating lowand hyper-dimensional chaos. Two or more chaotic systems can complement each other.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [20], a color image encryption algorithm proposed by using coupledmap lattices (CML) and a fractional-order chaotic system to increase the robustness and security of the system. A combination of two or more chaotic maps were also analyzed to enhance the complexity of the cryptosystem [21]. The two Logistic sequences were used to label the row coordinates and column coordinates of scrambled image and then MOD and XOR operations were applied to diffuse the plain image [22].…”
Section: Related Workmentioning
confidence: 99%
“…[20] -0.00368 0.00014 -0.02298 Ref. [21] 0.009118 −0.027993 −0.008005 The resultant images are shown in fig. 7.…”
Section: Key Sensitivity Analysismentioning
confidence: 99%
“…A statistical attack is a common analysis approach employed by cryptanalysts. If a designed encryption algorithm can generate a uniform distribution Security and Communication Networks 7 of the pixels in the cipher-image, then it can effectively resist the histogram attack [43][44][45]. the original information, the following function is usually employed to calculate the correlation coefficients:…”
Section: Key Space and Its Sensitivitymentioning
confidence: 99%