2015
DOI: 10.5815/ijcnis.2015.05.04
|View full text |Cite
|
Sign up to set email alerts
|

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems

Abstract: Abstract-This paper puts forward a novel image encryption scheme based on ordinary differential equation system. Firstly, a hyper-chaotic differential equation system is used to generate two hyper-chaotic orbit sequences. Introducing the idea of hybrid orbit, two orbits are mixed to generate a hybrid hyper-chaotic sequence which is used to be the initial chaotic key stream. Secondly, the final encryption key stream is generated through two rounds of diffusion operation which is related to the initial chaotic k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Modern cryptographic attacks and countermeasures, as discussed in "A New Approach of the Cryptographic Attacks" [4], provide insights into the evolving landscape of cryptographic vulnerabilities. As the digital age presents new challenges, advanced image encryption schemes safeguard visual data from unauthorized access [11]. In brief, cryptography has evolved from its classical roots to address contemporary challenges.…”
Section: Introductionmentioning
confidence: 99%
“…Modern cryptographic attacks and countermeasures, as discussed in "A New Approach of the Cryptographic Attacks" [4], provide insights into the evolving landscape of cryptographic vulnerabilities. As the digital age presents new challenges, advanced image encryption schemes safeguard visual data from unauthorized access [11]. In brief, cryptography has evolved from its classical roots to address contemporary challenges.…”
Section: Introductionmentioning
confidence: 99%
“…An initial chaotic key stream is derived using the obtained hybrid hyper chaotic sequence which is gone through two rounds of diffusion operation on an initial key and plain image to become an encryption key stream. [42].…”
Section: Related Workmentioning
confidence: 99%