2019
DOI: 10.1371/journal.pone.0225031
|View full text |Cite
|
Sign up to set email alerts
|

A novel image encryption technique using hybrid method of discrete dynamical chaotic maps and Brownian motion

Abstract: Information security is an important and critical subject of the current digital era. Nowadays, almost all information is digital in nature and security from hackers and eavesdroppers has become vital in civil (big giant corporations) as well as in defense organizations. One type of information in bit streams is in the form of digital images. In this article, an idea to combine Brownian motion with ternary unique orientation has been implemented which is related to random motion over time and spatial coordinat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
21
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
8
1
1

Relationship

2
8

Authors

Journals

citations
Cited by 44 publications
(21 citation statements)
references
References 56 publications
0
21
0
Order By: Relevance
“…Brownian motion is a spontaneous movement of particles floating in a liquid or gas substance due to interactions between the fast-moving atoms and molecules. The particles' evolution along three primary directions (here, X, Y, and Z) and mathematically defined as [23]:…”
Section: Brownian Motion (Bm)mentioning
confidence: 99%
“…Brownian motion is a spontaneous movement of particles floating in a liquid or gas substance due to interactions between the fast-moving atoms and molecules. The particles' evolution along three primary directions (here, X, Y, and Z) and mathematically defined as [23]:…”
Section: Brownian Motion (Bm)mentioning
confidence: 99%
“…[19] used a block cipher in an adequate mode of operation and the Rijndael architecture employing chaotic maps to propose a new image encryption scheme. In [20], the authors combine Brownian motion with ternary unique orientation with chaotic dynamical map to design a new cryptographical algorithm. A novel image encryption algorithm using chaotic maps and genetic operations was presented in [21].…”
Section: Introductionmentioning
confidence: 99%
“…However, some existing chaotic-based encryption algorithms have some shortcomings. Such as, the key design is simple [19,20], cannot resist some plaintext attacks [21][22][23] and requires a large number of pseudorandom numbers [9,23,26]. These methods may lead to inefficient encryption processes and lower security levels.…”
Section: Introductionmentioning
confidence: 99%