2014
DOI: 10.1007/s11071-014-1445-7
|View full text |Cite
|
Sign up to set email alerts
|

An efficient chaotic image encryption based on alternate circular S-boxes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
38
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 50 publications
(41 citation statements)
references
References 26 publications
1
38
0
Order By: Relevance
“…The dynamic developments in the multimedia industry and the Internet lead to a considerable amount of worry regarding the security of information transmitted over open or stored channels [1][2][3]. How to protect information from being unauthorized handled is becoming extremely crucial.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The dynamic developments in the multimedia industry and the Internet lead to a considerable amount of worry regarding the security of information transmitted over open or stored channels [1][2][3]. How to protect information from being unauthorized handled is becoming extremely crucial.…”
Section: Introductionmentioning
confidence: 99%
“…Chaotic systems that satisfy the major requirements of cryptography properties such as diffusion and confusion are differentiated on the basis of their reactiveness to ergodicity, pseudorandomness, unpredictability, control parameters, and initial conditions; this makes chaotic systems particularly catch heaps of heed for cryptology [1][2][3][4][5]. Due to this matter, chaotic S-boxes have proved to be superior for encrypting a message.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the inherent characteristics of digital images such as high redundancy, bulk data capacity and strong correlation, the traditional image encryption schemes such as Data Encryption Standard, International Data Encryption Algorithm and Advanced Encryption Standard, could not gear the demand of digital image encryption acceptably [17,34]. However, the chaos-based image encryption schemes show brilliant performances due to the intrinsic characteristics of chaotic system, such as sensitiveness to initial condition, non-periodicity, persudo-random property [27].…”
Section: Introductionmentioning
confidence: 99%
“…In [14][15][16][17][18][19][20], we see numerous encryption applications pertaining to high-speed image processing systems.…”
Section: Introductionmentioning
confidence: 99%