2018
DOI: 10.1007/s11042-018-5844-5
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers

Abstract: In this paper, we propose an efficient and self-adapting colour-image encryption algorithm based on chaos and the interactions among multiple red, green and blue (RGB) layers. Our study uses two chaotic systems and the interactions among the multiple layers to strengthen the cryptosystem for the colour-image encryption, which can achieve better confusion and diffusion performances. In the confusion process, we use the novel Rubik's Cube Scheme (RCS) to scramble the image. The significant advantage of this appr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
26
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(28 citation statements)
references
References 45 publications
(40 reference statements)
2
26
0
Order By: Relevance
“…Due to the wide usage of images as in the Internet, its content protection has become an urgent issue. So recently, researchers have introduced many schemes for image encryption [1]- [5]. These algorithms include two types of encryption; symmetric key and public key [6].…”
Section: Introductionmentioning
confidence: 99%
“…Due to the wide usage of images as in the Internet, its content protection has become an urgent issue. So recently, researchers have introduced many schemes for image encryption [1]- [5]. These algorithms include two types of encryption; symmetric key and public key [6].…”
Section: Introductionmentioning
confidence: 99%
“…In this section, speed analysis is given and some similar plaintext related algorithms in Ref. [ 28 , 32 , 36 , 38 ] are used to make a comparison with our scheme. Here, one standard image of Lena with size or is used as a test image and the running speed of different algorithms in literature are listed in in Table 12 .…”
Section: Experimental Results and Security Analysismentioning
confidence: 99%
“…In order to conquer the issue of low key sensitivity and plaintext sensitivity, researchers have proposed some plaintext related image encryption schemes in recent years [ 28 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 ]. For some algorithms in [ 28 , 29 , 30 , 31 , 32 ], the confusion process is related to plain image in some ways.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 18 enlisted the time comparison of our 3C3R with the Refs. [79,81,98,99] that possess a satisfactory security level. The least encryption and decryption time was taken by the proposed 3C3R shows that our algorithm gives satisfactory results with minimum times.…”
Section: Performance Comparisonmentioning
confidence: 99%