2015
DOI: 10.1007/s11071-015-1957-9
|View full text |Cite
|
Sign up to set email alerts
|

An image encryption algorithm based on the perturbed high-dimensional chaotic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
61
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 81 publications
(62 citation statements)
references
References 18 publications
1
61
0
Order By: Relevance
“…This can be seen more clearly by comparing it with the algorithms proposed by Wang [27], Murillo-Escobar [28] and Tong [31], all in 2015 and by Wu [36] and Tong [37], both in 2016. To our knowledge, few algorithms proposed recently handle the correlation between different colors.…”
Section: Experimental Results and Cryptanalysismentioning
confidence: 81%
See 1 more Smart Citation
“…This can be seen more clearly by comparing it with the algorithms proposed by Wang [27], Murillo-Escobar [28] and Tong [31], all in 2015 and by Wu [36] and Tong [37], both in 2016. To our knowledge, few algorithms proposed recently handle the correlation between different colors.…”
Section: Experimental Results and Cryptanalysismentioning
confidence: 81%
“…Som et al proposed an algorithm in which the original image is first scrambled using the generalized Arnold cat map to achieve confusion and the scrambled image is then encrypted using chaotic sequences generated by multiple one-dimensional chaotic maps [30]. A perturbed high-dimensional chaos system was designed for image encryption according to Devaney and topological conjugate definition by Tong et al [31]. The proposed algorithm by Oztruk et al utilized a Lu-like chaotic system capable of exhibiting both Lorenz-like and Chen-like chaotic system behaviors for different parameter values [32].…”
Section: Introductionmentioning
confidence: 99%
“…The proposed scheme is compared with several existing schemes such as Wang and Xu, Chen et al's scheme, Tong et al's scheme, Wanga et al's scheme and Zhu et al's scheme, where we use the same data set in gray scales. Especially, here we consider the plain image Lena as a standard image for make the fair comparison with the other encryption schemes.…”
Section: Comparisonmentioning
confidence: 99%
“…The different security analysis shows that this scheme secures from different attacks. Tong et al 2 describe this scheme. For implementing high security about encryption, they design a perturbed high-dimensional Chaos technique.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation