2021
DOI: 10.1155/2021/1898998
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps

Abstract: The application of multimedia sensors is widespread, and people need to transmit images more securely and efficiently. In this paper, an image transmission scheme based on two chaotic maps is proposed. The proposed scheme consists of two parts, secure image transmission between sensor nodes and sink nodes (SIT-SS) and secure image transmission between sensor nodes and receivers (SIT-SR). For resource-constrained environments, SIT-SS utilizes Tent-Logistic Map (TLM) to generate chaotic sequences and adopts TLM-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 53 publications
(107 reference statements)
0
3
0
Order By: Relevance
“…For the pixel-level filtering and DNA diffusion problem with low encryption strength, they also proposed an improved scheme based on cyclic replacement and nonlinear replacement [25] to enhance the obfuscation and diffusion of encryption and improve the encryption strength. In addition, they utilized two different chaotic maps to enhance the security of image data [26].…”
Section: Related Studiesmentioning
confidence: 99%
“…For the pixel-level filtering and DNA diffusion problem with low encryption strength, they also proposed an improved scheme based on cyclic replacement and nonlinear replacement [25] to enhance the obfuscation and diffusion of encryption and improve the encryption strength. In addition, they utilized two different chaotic maps to enhance the security of image data [26].…”
Section: Related Studiesmentioning
confidence: 99%
“…When compared to pixel-by-pixel permutation methods, vector-level permutation methods can improve encryption efficiency while maintaining the effect of confusion [40,41]. As shown in Figure 2, in order to quickly scramble the pixels in the intermediate cipher image C (1) , our proposed IEA-IF-DLT performs three rounds of plane-level permutation operations from the x-axis, y-axis, and z-axis directions, respectively.…”
Section: Plane-level Permutationmentioning
confidence: 99%
“…As one of the important carriers of information, images are widely transmitted and stored over the Internet. Thus, the privacy and security of image information are receiving more and more attention [10][11][12][13][14][15][16]. Different from text, an image has bulk data capacity, and the adjacent pixels have a strong correlation.…”
Section: Introductionmentioning
confidence: 99%