2018
DOI: 10.1007/s11071-018-4251-9
|View full text |Cite
|
Sign up to set email alerts
|

A parallel image encryption algorithm based on the piecewise linear chaotic map and hyper-chaotic map

Abstract: This paper proposes a parallel digital image encryption algorithm based on a piecewise linear chaotic map (PWLCM) and a four-dimensional hyper-chaotic map (FDHCM). Firstly, two decimals are obtained based on the plain-image and external keys, using a novel parallel quantification method. They are used as the initial value and control parameter for the PWLCM. Then, an encryption matrix and four chaotic sequences are constructed using the PWLCM and FDHCM, which control the permutation and diffusion processes. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
50
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 95 publications
(51 citation statements)
references
References 47 publications
(70 reference statements)
1
50
0
Order By: Relevance
“…To investigate the randomness property of the generated PRNG sequence S, we applied NIST SP 800-22 specified tests. These tests comprise of fifteen (15) assessments that are performed on a generated sequence of 10 6 bits length. We used the same initial values and control parameters for constructing S-box to generate the PRNG sequence whose results are presented in Table 3.…”
Section: S-box Constructionmentioning
confidence: 99%
See 1 more Smart Citation
“…To investigate the randomness property of the generated PRNG sequence S, we applied NIST SP 800-22 specified tests. These tests comprise of fifteen (15) assessments that are performed on a generated sequence of 10 6 bits length. We used the same initial values and control parameters for constructing S-box to generate the PRNG sequence whose results are presented in Table 3.…”
Section: S-box Constructionmentioning
confidence: 99%
“…tems in image encryption is not new, including many employing one-dimensional or higher dimension chaotic systems to generate a sequence of random numbers for construction of a cipher image that have been broached in [12][13][14][15][16] . However, most of these approaches produce images that are vulnerable to various attacks due to their narrow key-space allowance and imprecise mathematical construction.…”
Section: Application Of Proposed Cascade Protocol In Image Encryptionmentioning
confidence: 99%
“…Up to now, all kinds of image encryption algorithms through chaotic system are proposed [1,[8][9][10][11][12][13]. For example, Hua et al [8] proposed an image encryption scheme using 2D Logistic-adjusted-Sine map.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, Natiq et al [10] designed a new hyperchaotic map and its application for image encryption. Luo Y and his research team [11] proposed a parallel image encryption algorithm through two chaotic maps.…”
Section: Introductionmentioning
confidence: 99%
“…Many interesting image encryption algorithms based on different chaotic maps were proposed in recent years. A piecewise linear chaotic map and a four-dimensional hyper-chaotic map are used to control the permutation and diffusion processes in an algorithm [15]. The algorithm [16] utilizes a Chebyshev map and rotation equation for permutation and substitution operations.…”
Section: Introductionmentioning
confidence: 99%