2019 3rd International Conference on Computing Methodologies and Communication (ICCMC) 2019
DOI: 10.1109/iccmc.2019.8819860
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Chaos based Image Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 31 publications
(12 citation statements)
references
References 15 publications
0
12
0
Order By: Relevance
“…Furthermore, a comparison of the scheme has been made with [ 24 , 25 , 26 , 28 , 33 , 34 , 36 , 37 , 39 , 44 , 55 ] for PSNR and payload for natural images MI-K and MI-M as shown in Table 7 .…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, a comparison of the scheme has been made with [ 24 , 25 , 26 , 28 , 33 , 34 , 36 , 37 , 39 , 44 , 55 ] for PSNR and payload for natural images MI-K and MI-M as shown in Table 7 .…”
Section: Resultsmentioning
confidence: 99%
“…Pertinent to mention, though 1-D chaos-based algorithms are simple to implement but have disadvantages like less robustness, simpler dynamical nature, and reduced keyspace [ 54 , 55 , 56 , 57 , 58 , 59 , 60 , 61 , 62 , 63 , 64 ]. On the other hand, the HC systems have complex dynamical behavior, better key sensitivity, and larger keyspace.…”
Section: Related Workmentioning
confidence: 99%
“…Suneja et al [21] Key security evaluation Comparison and review of chaotic maps A deeper analysis of the modified logistic map was performed with three-state test and phase portrait apart from bifurcation diagram, Lyapunov exponent [22]. Surprisingly, a divergent dynamics of the map was observed, which is given in Fig.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Here, r is known as the control parameter that lies in the range [0, 1] and a n is defined as the ratio of existing population to highest possible population, which lies in the interval [0,4]. Initial values of a 0 and r determine the sequence generated with the help of LM.…”
Section: Lm and Ilmmentioning
confidence: 99%
“…The types of information exchange have undergone a radical transformation during last few decades. In the recent scenario, we exchange our most of the information in the form of digital images using electronic devices such as computers or mobiles [1][2][3][4]. Hence, security of digital images is a matter of great concern.…”
Section: Introductionmentioning
confidence: 99%