2021
DOI: 10.1007/s00500-021-06500-y
|View full text |Cite
|
Sign up to set email alerts
|

An image encryption scheme based on finite-time cluster synchronization of two-layer complex dynamic networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 50 publications
(13 citation statements)
references
References 42 publications
0
13
0
Order By: Relevance
“…By analyzing Table 6 , it can be obtained that, as a whole, the proposed algorithm has smaller correlation coefficients compared with Refs. [ 33 , 34 , 35 , 36 , 37 ].…”
Section: Security Analysesmentioning
confidence: 99%
“…By analyzing Table 6 , it can be obtained that, as a whole, the proposed algorithm has smaller correlation coefficients compared with Refs. [ 33 , 34 , 35 , 36 , 37 ].…”
Section: Security Analysesmentioning
confidence: 99%
“…This makes the actual key space of IEALM can not reach that estimated by the designers. Strictly speaking, the key space of IEALM is only 2 2L • (256MN) 3 . As for a plain-image of size 2048 × 2048, the sizes of key space of IEALM implemented with precision 32-bit and 64-bit are 10 46 and 10 65 , respectively.…”
Section: Analysis Of the Key Spacementioning
confidence: 99%
“…Due to the special characteristics of image data, such as the large amount of data itself and strong correlation existing between neighbouring pixels, it is generally impractical to encrypt the protected object with the classic text encryption algorithms by converting the object into one-dimensional text data. Under this background, a large number of image encryption algorithms were proposed in the past three decades [2,3,4]. Unfortunately, some were found insecure of different extents from the perspective of modern cryptanalysis [5,6,7,8,9,10].…”
Section: Introductionmentioning
confidence: 99%
“…In 1990, the pioneer workers Pecora and Carroll first proposed the concept of chaos synchronization and solved the synchronization problem of two identical chaotic systems under different initial conditions [3]. Since then, chaos synchronization control has become a very active research topic [4][5][6][7][8][9][10][11][12][13][14][15][16], for example, projective synchronization control and hybrid function projective synchronization control. Many control methods have been used to synchronize different chaotic systems, such as feedback linearization method [17], optimal control [18], and neural network control [19][20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%