2020
DOI: 10.1016/j.optlaseng.2019.105995
|View full text |Cite
|
Sign up to set email alerts
|

An image encryption algorithm based on a hidden attractor chaos system and the Knuth–Durstenfeld algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
92
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 168 publications
(92 citation statements)
references
References 38 publications
0
92
0
Order By: Relevance
“…A large number of new chaotic systems have been proposed one after another, and their application scopes are more and more extensive [1][2][3][4][5][6][7][8]. With the progress of science and technology, chaos has been applied not only to communication [9][10][11][12], image processing [13][14][15], complex networks [16][17][18][19][20][21], synchronization [22][23][24][25][26][27], electronic circuits [28][29][30], and optimization [31][32][33][34][35] but also to encryption studies [36][37][38][39][40][41]. is is because chaotic signal has good pseudorandom, initial-value sensitive, and long-term unpredictable characteristics, which enhances the confusion and diffusion of encrypted data.…”
Section: Introductionmentioning
confidence: 99%
“…A large number of new chaotic systems have been proposed one after another, and their application scopes are more and more extensive [1][2][3][4][5][6][7][8]. With the progress of science and technology, chaos has been applied not only to communication [9][10][11][12], image processing [13][14][15], complex networks [16][17][18][19][20][21], synchronization [22][23][24][25][26][27], electronic circuits [28][29][30], and optimization [31][32][33][34][35] but also to encryption studies [36][37][38][39][40][41]. is is because chaotic signal has good pseudorandom, initial-value sensitive, and long-term unpredictable characteristics, which enhances the confusion and diffusion of encrypted data.…”
Section: Introductionmentioning
confidence: 99%
“…Since 1960, the research and application of nonlinear systems have been more and more extensive. Many problems in complex networks [1][2][3][4][5][6][7], memristor [8][9][10][11], electronic circuits [12][13][14][15], image processing [16][17][18][19][20][21], economics [22], and other fields can be attributed to the study of nonlinear systems. Chaos is a special state of motion in a nonlinear system, which is a random-like behavior generated by a deterministic system and is extremely sensitive to initial values and highly dependent on them [23][24][25][26][27][28].…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development of network technology, the security and privacy protection problems of multimedia information have become a hot subject. In order to promote the security of information transmission, scholars have proposed a large amount of image encryption algorithms based on different mechanisms and theories, such as chaotic map [1][2][3][4][5][6][7][8][9][10][11][12][13], neural network [14], DNA [15][16][17][18], and so on. e security performance of the image encryption algorithms mainly depends on statistical test indicators, such as key space, histogram, key sensitivity analysis, information entropy, differential attack, and so on.…”
Section: Introductionmentioning
confidence: 99%
“…e image encryption algorithm based on DNA encoding and spatiotemporal chaos is proposed in [15]; nevertheless, it is broken in [29] by using chosen-plaintext attack and chosenciphertext attack with lower computation complexity and data complexity, respectively. In [30], the security analysis of an image encryption algorithm based on 2D Henon-Sine map and DNA proposed in [17] is given; it is found that cipher image can be cracked by utilizing chosen-plaintext attack without known keys, and its attack complexity is O (18).…”
Section: Introductionmentioning
confidence: 99%