2018
DOI: 10.1007/s11042-018-6612-2
|View full text |Cite
|
Sign up to set email alerts
|

An image encryption algorithm based on substitution technique and chaos mixing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

3
41
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 69 publications
(46 citation statements)
references
References 49 publications
3
41
1
Order By: Relevance
“…In [26], the author proposes an image encryption algorithm based on the optimized Arnold scrambling algorithm and diffusion algorithm, which improves the speed of image encryption and decryption. [27] proposed a fast and secure image encryption algorithm based on a new onedimensional chaotic system. Multiple chaotic system models were combined to generate pseudo-random sequences, which improved the secret key space and increased the security of the algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…In [26], the author proposes an image encryption algorithm based on the optimized Arnold scrambling algorithm and diffusion algorithm, which improves the speed of image encryption and decryption. [27] proposed a fast and secure image encryption algorithm based on a new onedimensional chaotic system. Multiple chaotic system models were combined to generate pseudo-random sequences, which improved the secret key space and increased the security of the algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…This section makes the performance comparison analysis from six aspects: key space, encryption and decryption speed, secret key sensitivity, equivalent key sensitivity, plain-image sensitivity and cipher-image sensitivity. The objects of comparison are AES (with 256-bit long key in CBC mode) [45] and the schemes in [11,12,13] Tables VI-IX. In addition, the notes for the equivalent key sensitivity analysis are as follows:…”
Section: Comparative Analysismentioning
confidence: 99%
“…(iv) In the image cryptosystem [12], the equivalent keys are W, X, Y, Z and two S-boxes S x and S y (see [12]). Without loss of generality, only W's sensitivity is analyzed.…”
Section: Comparative Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…This paper proposes a new framework that combines the cascade model and delay. This framework rationally integrates three chaotic maps to overcome the performance flaws of one-dimensional (1D) chaotic maps [16]. The experimental results showed that the chaotic maps produced by this model have initial value sensitivity and a large parameter interval.…”
Section: Introductionmentioning
confidence: 99%