2015 6th IEEE International Conference on Software Engineering and Service Science (ICSESS) 2015
DOI: 10.1109/icsess.2015.7339125
|View full text |Cite
|
Sign up to set email alerts
|

An image encryption method based on tent and Lorenz chaotic systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Jishuang et al [9], The first algorithm influenced Lorenz's plan to generate three phase transformers through a variety of signals, and this sequence was reversed. Next, the average of the three sections is selected to indicate h from the map and create a tent layout.…”
Section: Literature Surveymentioning
confidence: 99%
“…Jishuang et al [9], The first algorithm influenced Lorenz's plan to generate three phase transformers through a variety of signals, and this sequence was reversed. Next, the average of the three sections is selected to indicate h from the map and create a tent layout.…”
Section: Literature Surveymentioning
confidence: 99%
“…However, these approaches have not been proved to be effective due to the intrinsic features of enormous data capacity, a strong correlation between neighboring pixels, and increased redundancy (Al-Husainy, 2012;Ravichandran et al, 2015). Therefore, chaos-based methods have received much attention in recent research (Enayatifar et al, 2015;Li et al, 2015;Belazi et al, 2016;Jin & Liu, 2017).…”
mentioning
confidence: 99%