2020
DOI: 10.1016/j.sigpro.2019.107340
|View full text |Cite
|
Sign up to set email alerts
|

An improved image encryption algorithm with finite computing precision

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
53
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 102 publications
(54 citation statements)
references
References 36 publications
1
53
0
Order By: Relevance
“…In [34], Liu et al proposed a new two-dimensional Sine ICMIC modulation map (2D-SIMM) and designed a fast image encryption scheme using cyclic shift permutation and pixel-level diffusion. In [35], Chen and Sun applied the DPFMC method to resist the dynamical degradation of the 2D-SCL map and combined the confusion and diffusion processes in one stage to improve the running speed. In [36], Zhu and Sun proposed a new image security scheme using the modified skew tent map to generate keystream correlated with plaintext.…”
Section: Introductionmentioning
confidence: 99%
“…In [34], Liu et al proposed a new two-dimensional Sine ICMIC modulation map (2D-SIMM) and designed a fast image encryption scheme using cyclic shift permutation and pixel-level diffusion. In [35], Chen and Sun applied the DPFMC method to resist the dynamical degradation of the 2D-SCL map and combined the confusion and diffusion processes in one stage to improve the running speed. In [36], Zhu and Sun proposed a new image security scheme using the modified skew tent map to generate keystream correlated with plaintext.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, various frameworks that can improve the properties of simple chaotic systems have been proposed, including a combination of multiple maps [ 46 , 47 , 48 , 49 ], modifying the chaotic sequences generated by chaotic maps [ 50 , 51 , 52 ], and modifying the existing maps [ 53 , 54 , 55 ]. Most of the frameworks set the existing maps as a whole and incorporate them into the fixed format [ 54 , 56 , 57 , 58 ], thus generating new maps with better performance automatically. The single neuronal dynamical system in self-feedbacked Hopfield network is also applicable to existing frameworks, and it can achieve a positive effect.…”
Section: Introductionmentioning
confidence: 99%
“…Since Fridrich first proposed the scheme of image encryption based on chaos in 1998 [19], most image encryption methods adopt permutation-diffusion encryption model, which has been proved to have good performance [20,21,22,23,24]. since permutation and diffusion operations are carried out separately and independently, and in order to achieve good diffusion effect, permutation and diffusion operations for the same pixel value are usually performed in multiple rounds, which will undoubtedly increase the complexity of the algorithm and reduce the encryption efficiency.…”
Section: Introductionmentioning
confidence: 99%
“…[22], the diffusion layer and the substitution layer are repeatedly executed three times to improve the security of the algorithm. Chen et al proposed an improved image encryption algorithm based on chaotic mapping [23]. The same pixel performs two encryption operations, namely row encryption and column encryption.…”
Section: Introductionmentioning
confidence: 99%