2024
DOI: 10.1088/1402-4896/ad4f64
|View full text |Cite
|
Sign up to set email alerts
|

A two-dimensional chaotic model and its application in image encryption

RongQing Lei,
LingFeng Liu

Abstract: In this paper, we propose a rule that follows a time-varying delay construction method and construct a time-varying delay scheme based on it. This construction scheme is also combined with a polynomial to obtain a novel two-dimensional chaotic model. Both mathematical analysis and experimental results show that the model satisfies the chaos condition. 
Good experimental results have been achieved in complexity analysis, information entropy analysis, and Auto-correlation analysis, and have certain compe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 27 publications
0
0
0
Order By: Relevance
“…As can be seen from the figure, despite the fact that we have implemented a variety of attack strategies of different degrees against the cryptographic images, we are still able to accurately decrypt the correct results while maintaining a satisfactory level of clarity. What's more, under the same attack conditions, our algorithm shows a more excellent performance compared to the comparison algorithm [37], which further verifies the high robustness of our encryption algorithm.…”
Section: Robustness Analysissupporting
confidence: 63%
“…As can be seen from the figure, despite the fact that we have implemented a variety of attack strategies of different degrees against the cryptographic images, we are still able to accurately decrypt the correct results while maintaining a satisfactory level of clarity. What's more, under the same attack conditions, our algorithm shows a more excellent performance compared to the comparison algorithm [37], which further verifies the high robustness of our encryption algorithm.…”
Section: Robustness Analysissupporting
confidence: 63%