2024
DOI: 10.1088/1402-4896/ad3487
|View full text |Cite
|
Sign up to set email alerts
|

An image encryption scheme based on the four-dimensional chaotic system and the mealy finite state machine

Xuncai Zhang,
Guanhe Liu,
Jiali Di

Abstract: This paper proposes a four-dimensional hyperchaotic system to overcome the defect of weak encryption effect due to the simple complexity of low-dimensional chaotic systems in chaos-based image encryption schemes, which is verified to have better chaotic properties by dynamics analysis, sensitivity analysis, and randomness test. In addition, this paper proposes an image encryption scheme by combining the proposed chaotic system with the Mealy finite state machine (MFSM) to overcome the problem that some schemes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 53 publications
0
0
0
Order By: Relevance
“…For example, Huang et al proposed a chaotic image encryption algorithm based on spiral traversal and finite field bidirectional diffusion [15]. Zhang, et al proposed an image encryption scheme that combines the proposed chaotic system with Mealy finite state machine (MFSM) [16]. Mao et al proposed a real-time image encryption algorithm based on the combination of chaotic mapping and optimally boosted wavelet transforms [17].…”
Section: Introductionmentioning
confidence: 99%
“…For example, Huang et al proposed a chaotic image encryption algorithm based on spiral traversal and finite field bidirectional diffusion [15]. Zhang, et al proposed an image encryption scheme that combines the proposed chaotic system with Mealy finite state machine (MFSM) [16]. Mao et al proposed a real-time image encryption algorithm based on the combination of chaotic mapping and optimally boosted wavelet transforms [17].…”
Section: Introductionmentioning
confidence: 99%
“…It has characteristics such as sensitivity to initial conditions, randomness, and ergodicity [8], which can generate random chaotic sequences. Therefore, it is widely used in the field of image encryption [9][10][11][12][13][14]. Chen et al [15] combined chaotic systems with compressive sensing, used SHA-3 to calculate the hash value of the preprocessed image, and designed a new mathematical model to calculate the key.…”
Section: Introductionmentioning
confidence: 99%