2018
DOI: 10.1155/2018/8402578
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map

Abstract: In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
26
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 54 publications
(26 citation statements)
references
References 48 publications
0
26
0
Order By: Relevance
“…Compared to some of the recent encryption algorithms presented in [8–10], the proposed framework shows improved performance in terms of its encryption capability. The proposed framework is a single fused system for both image compression and encryption.…”
Section: Experimentation and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Compared to some of the recent encryption algorithms presented in [8–10], the proposed framework shows improved performance in terms of its encryption capability. The proposed framework is a single fused system for both image compression and encryption.…”
Section: Experimentation and Resultsmentioning
confidence: 99%
“…Therefore, we have a total of 21 tuneable parameters that determine the key space and it is evident that this cryptosystem offers a significantly large key space to avoid brute force attack. Compared to some of the recent encryption algorithms presented in [8][9][10], the proposed framework shows improved performance in terms of its encryption capability. The proposed framework is a single fused system for both image compression and encryption.…”
mentioning
confidence: 99%
“…where L is the normalization operation, ϑ ∈ G r , and the parameters of φ ϑ and ω are the weights for each of the components, which are set as φ ϑ � ω � 1/5. e second term in (5) corresponds to all four feature maps G r detected as significant regions. After these four steps, the saliency map can be obtained.…”
Section: (I)mentioning
confidence: 99%
“…Image encryption technology can prevent privacy leakage and can ensure secure image data sharing on cloud platforms. Conventional image encryption technology can be divided into two categories: full encryption [2][3][4][5][6] and selective encryption [7][8][9][10][11][12]. Full encryption serves to encrypt the complete image data, which not only causes high complexity and low efficiency but also cannot satisfy the rapid expansion of image data demand.…”
Section: Introductionmentioning
confidence: 99%
“…on quantum [9]- [13], on waves [14], [15], on electrocardiograph (ECG) signals [16] and on chaos [17]- [26]. Most image ciphers adopt the traditional confusion-diffusion structure that was proposed by Fridrich [27].…”
Section: Introductionmentioning
confidence: 99%