2022
DOI: 10.3390/asi5030057
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap

Abstract: Recently, many researchers have been interested in the application of chaos in cryptography. Specifically, numerous research works have been focusing on chaotic image encryption. A comprehensive survey can highlight existing trends and shed light on less-studied topics in the area of chaotic image encryption. In addition to such a survey, this paper studies the main challenges in this field, establishes an ecosystem for chaotic image encryption, and develops a future roadmap for further research in this area.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(24 citation statements)
references
References 266 publications
0
16
0
Order By: Relevance
“…In addition to the previous comparisons, there are other comparisons between references [ 50 , 51 ]. For the proposed work for the time correlation coefficient measures in [ 50 ], the time range is 8–78 s for images of size 128 × 128 pixels, while, for the proposed work, the time range is 0.5–11 s for images of different sizes bigger than 128 × 128).…”
Section: Resultsmentioning
confidence: 99%
“…In addition to the previous comparisons, there are other comparisons between references [ 50 , 51 ]. For the proposed work for the time correlation coefficient measures in [ 50 ], the time range is 8–78 s for images of size 128 × 128 pixels, while, for the proposed work, the time range is 0.5–11 s for images of different sizes bigger than 128 × 128).…”
Section: Resultsmentioning
confidence: 99%
“…In real-time secure image transmission systems, chaotic system is a well-known method deployed for encryption [20]. The starting settings and system parameters are extremely important in these systems.…”
Section: Chaotic Baker Mapmentioning
confidence: 99%
“…There are two forms of encryption: there are two types (Symmetric key and Asymmetric key algorithm). There are many reasons to use encryption: Reliability refers to the fact that the cipher text can be recovered and that the recovered data is identical to the plaintext; the encryption mechanism will keep the information hidden, which is security [19,20]. The SHIFT function is used to shift the elements of a vector or array in a circular fashion.…”
Section: Introductionmentioning
confidence: 99%
“…Image pixels are randomly reconfigured in chaotic image encryption. The Cat map, the Line map, and the Baker map are all examples of chaotic maps that can be utilized for picture encryption [20,22]. The Cat map performs a geometric transformation.…”
Section: Introductionmentioning
confidence: 99%