2019
DOI: 10.1016/j.optlaseng.2019.06.015
|View full text |Cite
|
Sign up to set email alerts
|

A privacy encryption algorithm based on an improved chaotic system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 33 publications
0
7
0
Order By: Relevance
“…Image-encryption algorithms should be highly sensitive to keys [21]. To ensure security, even if the key used is only slightly different from the correct key, it should have a completely different encryption and decryption result.…”
Section: Key Sensitivity Analysismentioning
confidence: 99%
“…Image-encryption algorithms should be highly sensitive to keys [21]. To ensure security, even if the key used is only slightly different from the correct key, it should have a completely different encryption and decryption result.…”
Section: Key Sensitivity Analysismentioning
confidence: 99%
“…A feasible encryption algorithm needs the ability of anti-interference, and robustness is an important indicator 2 , 7 , 26 , 44 . We add Salt-and-Pepper noise with different intensities to the ciphertext images, and we also make different degrees of data loss to the ciphertext image at different locations.…”
Section: Performance Analysesmentioning
confidence: 99%
“…At the same time, MATLAB 2018 (a) is used to plot some graphs. The average running speed of encryption is 0.925 s and the encryption time of other encryption schemes 7 , 14 , 25 , 33 is 2.44 s, 2.135 s, 1.067064 s and 0.9665 s, respectively. The comparison results show that our algorithm is more efficient and suitable for real-time applications.…”
Section: Performance Analysesmentioning
confidence: 99%
“…In [6], this article proposes an encryption system based on an improved system of chaos that hides key information. The first thing to do is improve the chaotic CML diagram, and join the chaotic state from zero.…”
Section: Related Workmentioning
confidence: 99%