2020
DOI: 10.1109/access.2020.2970806
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: This paper presents an efficient and secure chaotic S-Box based image encryption algorithm. Firstly, by cryptanalyzing a multiple chaotic S-Boxes based image encryption algorithm, we successfully cracked the cryptosystem by using chosen-plaintext attack (CPA). Secondly, we put forward a new image encryption scheme based on a novel compound chaotic map and single S-Box. In the new scheme, a novel discrete compound chaotic system, Logistic-Sine system (LSS), is proposed, which has wider chaotic range and better … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
116
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 196 publications
(117 citation statements)
references
References 40 publications
1
116
0
Order By: Relevance
“…Figure 13 shows the histograms of Lena before and after encryption using HNNset2 from Table 2. To describe the distribution characteristics of the histograms quantitatively, the variance of the histograms for the three images (Lena, Fruits and Baboon) is calculated according to [36], and the results are shown in Table 11.…”
Section: Image Encryption Applicationmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 13 shows the histograms of Lena before and after encryption using HNNset2 from Table 2. To describe the distribution characteristics of the histograms quantitatively, the variance of the histograms for the three images (Lena, Fruits and Baboon) is calculated according to [36], and the results are shown in Table 11.…”
Section: Image Encryption Applicationmentioning
confidence: 99%
“…Figure 15 shows the histogram of the Lena image before and after encryption using HRNset1 from Table 4. The variance of the histograms for the three images (Lena, Fruits and Baboon) using HRNset1, is calculated according to [36], and the results are shown in Table 14. The entropy is evaluated by (11) using HRNset1, and using 8 bits (N = 8), Table 15 shows the entropies for the three images (Lena, Fruits and Baboon).…”
Section: Image Encryption Applicationmentioning
confidence: 99%
“…Step 3: Generate two random coding sequence CS = { c s(1), c s(2), …, c s( L )} and random decoding sequence DS = { d s(1), ds(2), …, d s( L )} by combining S with chaotic sequence X 1 and X 2 where floor(X) rounds the elements of X to the nearest integers towards minus infinity. mod(X, Y) find the remainder of X divided by Y. cs ( i ) ∈ [ 1 , 8 ], d s( i ) ∈ [ 1 , 8 ], i = 1, 2, …, L. cs ( i ) will be used as the DNA coding rule for i -th pixel and d s( i ) will be used as the DNA decoding rule for i -th pixel, respectively. It can be seen from Equations (6) and (7) that the generation of random encoding (decoding) sequence is related to pixel values of the image to be encrypted.…”
Section: Dna Coding and Key Generating Schemementioning
confidence: 99%
“…Therefore, chaos is closely related to cryptography and chaotic systems can be applied in cryptography, such as in the design of pseudo-random number generator (PRNG) [ 2 ] and S-Boxes [ 3 ]. Compared with traditional encryption algorithms, image encryption algorithm based on chaos theory has more advantages in security, complexity and speed [ 4 , 5 , 6 , 7 , 8 , 9 ]. In recent years, it has gradually become a hot research topic [ 10 , 11 , 12 , 13 , 14 ].…”
Section: Introductionmentioning
confidence: 99%
“…Chi-square test (χ 2 test) on grayscale images of different sizes. Variance is a quantitative analysis of the histogram and is calculated by the following formula[28]-[30]:…”
mentioning
confidence: 99%