2022
DOI: 10.1155/2022/5680357
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Lightweight Image Encryption Scheme Using Multichaos

Abstract: With an immense increase in Internet multimedia applications over the past few years, digital content such as digital images are stored and shared over global networks, the probability for information leakage and illegal modifications to the digital content is at high risk. These digital images are transferred using the network bandwidth; therefore, secure encryption schemes facilitate both information security and bandwidth issues. Hence, a state-of-the-art lightweight information security methodology is requ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 47 publications
0
1
0
Order By: Relevance
“…In order to increase the security of converting a plain image into an encrypted one, the major goal of [17] is to design a lightweight nonlinear mechanism for digital image security combining block cipher and chaos theory. Secure IoT (SIT), a simple encryption technique, was suggested in [18]. It uses a 64-bit key and the algorithm combines a Feistel architecture with a permutation-substitution network.…”
Section: Related Workmentioning
confidence: 99%
“…In order to increase the security of converting a plain image into an encrypted one, the major goal of [17] is to design a lightweight nonlinear mechanism for digital image security combining block cipher and chaos theory. Secure IoT (SIT), a simple encryption technique, was suggested in [18]. It uses a 64-bit key and the algorithm combines a Feistel architecture with a permutation-substitution network.…”
Section: Related Workmentioning
confidence: 99%
“…S 1 = round mod abs(x) − f loor abs(x) × 10 14 , 256 S 2 = round mod abs(x) − f loor abs(x) × 10 16 , 256…”
Section: Pixel Plane Confusionmentioning
confidence: 99%
“…One very promising direction is the application of chaotic maps and systems to image encryption. This is because cryptography places a particular emphasis on the introduction of nonlinear transformations, which is a distinctive feature of chaotic systems [16].…”
Section: Introductionmentioning
confidence: 99%
“…In [3], Wang et al introduced image encryption scheme based on S-box and cascaded chaos model that combines 2D and 1D chaos mappings to generate new chaos maps. In [24], A. Ullah et al introduced presented a lightweight image encryption scheme using multiple chaotic maps (4D) to generate random keys.…”
Section: Et Al Proposed An S-box Designmentioning
confidence: 99%