2018
DOI: 10.1007/s11071-018-4056-x
|View full text |Cite
|
Sign up to set email alerts
|

Brief review on application of nonlinear dynamics in image encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
147
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 226 publications
(147 citation statements)
references
References 75 publications
0
147
0
Order By: Relevance
“…A large secret key space of a cryptosystem is necessary to resist the brute-force attack and it is considered to be secure if the key space is equal or greater to 2 128 [17].…”
Section: Key Space Analysismentioning
confidence: 99%
“…A large secret key space of a cryptosystem is necessary to resist the brute-force attack and it is considered to be secure if the key space is equal or greater to 2 128 [17].…”
Section: Key Space Analysismentioning
confidence: 99%
“…Some concrete steps for evaluating security performances of a chaotic image encryption schemes were given in [25]. Unfortunately, IEAIE did not follow the lessons summarized in [18], [24], [25]. To attract the attention of designers of image encryption schemes on cryptanalysis, we check the security of every aspect of IEAIE and its test given in [27] as follows.…”
Section: A Some Security Defects Of Ieaiementioning
confidence: 99%
“…Among the image encryption algorithms, chaos-based ones have become more and more popular in recent years because chaotic systems have some special properties for image encryption, such as pseudorandomness, ergodicity, unpredictability, and extreme sensitivity to system parameters and initial values [3][4][5][6][7]. Generally speaking, there are two ways to perform image encryption, i.e., permutation and diffusion.…”
Section: Introductionmentioning
confidence: 99%