2021
DOI: 10.1109/access.2021.3099214
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic Image Encryption Algorithm Based on Zigzag Transform With Bidirectional Crossover From Random Position

Abstract: This paper proposes a Zigzag transform that starts at random positions and crosses bidirectionally (ZZBCRP) to scramble the image. The number of sequence types of this new Zigzag transform is the number of pixels in the plaintext image, which is more and more complicated than other Zigzag transform methods, and Arrangement in a bidirectional crossover method can better disrupt the pixel correlation of the plaintext image. After multiple rounds of Zigzag transformation, the Logistic system is used to generate a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 54 publications
0
12
0
Order By: Relevance
“…Information entropy is used as a metric to evaluate an image based on the randomness of the distribution of its gray pixels. Equation (11) shows how it is calculated for an image, where p(m i ) represents the probability of occurrence of each symbol m in the total number of M symbols in an image.…”
Section: B Information Entropymentioning
confidence: 99%
See 1 more Smart Citation
“…Information entropy is used as a metric to evaluate an image based on the randomness of the distribution of its gray pixels. Equation (11) shows how it is calculated for an image, where p(m i ) represents the probability of occurrence of each symbol m in the total number of M symbols in an image.…”
Section: B Information Entropymentioning
confidence: 99%
“…Many works in the literature showcase algorithms that combine the use of more than a single 1D or MD chaotic functions to achieve high levels of image encryption. The authors of [11] combine the use of the Logistic system with the hyperchaotic Chen system, in addition to a dynamic zigzag pattern which depends on the dimensions of the plain image being encrypted. The idea of utilizing a dynamic key is also proposed by the authors of [1] who combine the use of a fractional order chaotic map with elliptic curves.…”
Section: Introductionmentioning
confidence: 99%
“…The zigzag transform is capable of rearranging the cells of a 2D matrix to heavily decrease the correlation between adjacent pixels, an important property when considering image encryption. Gao et al [110] proposed an algorithm for image encryption utilizing a more complicated implementation of the transform that yields better security.…”
Section: Zigzag Transformmentioning
confidence: 99%
“…The use of this key matrix results in an acute reduction in the number of required iterations of the utilized hyperchaotic system. In [39], a color image encryption scheme that involves the use of chaos theory and a zigzag transform is proposed. The authors employ the zigzag transform in conjunction with an arrangement that changes in a bidirectional crossover manner to carry out the first stage of image encryption.…”
Section: Introductionmentioning
confidence: 99%