2020
DOI: 10.1109/access.2020.3006513
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Secure Image Encryption Algorithm Based on Non- Adjacent Coupled Maps

Abstract: In this paper, an image encryption algorithm based on non-adjacent coupled map lattices is designed. Compared with coupled map lattices, non-adjacent coupled map lattices have few periodic windows in bifurcation, and larger parameter range in chaos dynamics. Combined with the proposed chaotic system, a new alternative encryption structure between permutation, diffusion and substitution is proposed to improve the security and encryption efficiency of the algorithm. In the diffusion process, multiplication opera… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(16 citation statements)
references
References 48 publications
0
16
0
Order By: Relevance
“…In summary, the ideas of the above works [7][8][9][10][11]13,14,16,17,[22][23][24] mainly concentrate on three aspects: non-adjacent coupling [7][8][9][10][11], dynamical coupling [13,14,16,22,23], and multi-chaos mixing [17,24]. Based on our analysis, there still exist some problems in the three aspects.…”
Section: Introductionmentioning
confidence: 92%
See 3 more Smart Citations
“…In summary, the ideas of the above works [7][8][9][10][11]13,14,16,17,[22][23][24] mainly concentrate on three aspects: non-adjacent coupling [7][8][9][10][11], dynamical coupling [13,14,16,22,23], and multi-chaos mixing [17,24]. Based on our analysis, there still exist some problems in the three aspects.…”
Section: Introductionmentioning
confidence: 92%
“…To increase the spatial diffusion, reference [10] provided a hybrid-coupling mechanism that considers the adjacent and non-adjacent interactions simultaneously. Later, Zhang et al [11] employed a 3D Arnold cat map to establish coupling relations between lattices, which enlarges the chaotic regime over a wide range of parameters. In [12], Liu et al developed a NCML-based S-box shuffling method, which strengthens the ability to resist linear password attacks.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Another related work was proposed in [29] based on Arnold logistic lattice model, where the key similar to method of [26] was separating into several parts, as well as input image. Next, the value of key gets involved with a logistic-dynamic coupled map lattice model (LDCML) as equation 2 shows; where logistic map denoted by f (x), and sequence number and iterations are i (L ≥ i ≥ 1) and n respectively.…”
Section: Background and Related Workmentioning
confidence: 99%