2019
DOI: 10.1016/j.sigpro.2019.06.013
|View full text |Cite
|
Sign up to set email alerts
|

An image encryption scheme based on hybridizing digital chaos and finite state machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
46
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 139 publications
(50 citation statements)
references
References 47 publications
0
46
0
Order By: Relevance
“…This mode also depends on the IV that is selected similar to the CBC operation mode. The utilization of different IV s in ciphering the same input plaintext block yields different enciphered block [33]. Although the IV can be sent to the receiver openly, certain applications require securing it.…”
Section: B the Cipher Block Chaining (Cbc) Modementioning
confidence: 99%
“…This mode also depends on the IV that is selected similar to the CBC operation mode. The utilization of different IV s in ciphering the same input plaintext block yields different enciphered block [33]. Although the IV can be sent to the receiver openly, certain applications require securing it.…”
Section: B the Cipher Block Chaining (Cbc) Modementioning
confidence: 99%
“…The DCFSA chaotification method enhances the chaotic behaviour of classical maps, leading to chaotic trajectories with long cycle lengths [40]. Due to these desirable properties, DCFSA can be adopted to design new cryptographic hash function with high security.…”
Section: Dcfsa-based Hash Functionmentioning
confidence: 99%
“…In this paper, we propose a new chaotic hash function based on deterministic chaotic finite state automata (DCFSA) with dynamic perturbation. DCFSA was originally proposed to enhance 1D chaotic behaviors without using external entropy sources [39], [40]. Out of its various configurations, we select DCFSA FW P due to its various advantages such as large chaotic parameter range, high complexity, better randomness, and elevated nonlinearity.…”
Section: Introductionmentioning
confidence: 99%
“…These characteristics of chaotic systems have made them suitable for the construction of strong cryptographic algorithms. Consequently, they have been utilized to construct multimedia data encryption, substitution-boxes design, steganography, watermarking, hash functions algorithms, etc, [3,4,11,12] for the last decade. However, the security of these cryptographic algorithms heavily relies on the use of rich dynamics of digital chaotic maps and systems.…”
Section: Introductionmentioning
confidence: 99%