“…The image encryption procedure worked in this paper has been explained in Refs. [1,2,3], clearly. Therefore, in the current paper we do not give the details.…”
Section: Image Encryption Schemementioning
confidence: 95%
“…The row, column, color and other information algorithms from the hash key definition can be found clearly in Refs. [1,2].…”
Section: Image Encryption Schemementioning
confidence: 99%
“…Achievements in information and network technologies take the image security to an important position [1][2][3]. The secret communication has been used especially for important industrial projects and military applications.…”
Section: Introductionmentioning
confidence: 99%
“…
A recently proposed secure communication technique in Refs. [1,2,3] is initially applied to the energy sector. For this, especially the energy sector images which have a secret character for the companies and sectoral institutions have been ciphered and deciphered successfully.
A recently proposed secure communication technique in Refs. [1,2,3] is initially applied to the energy sector. For this, especially the energy sector images which have a secret character for the companies and sectoral institutions have been ciphered and deciphered successfully. The applied tests have proven that the proposed method is fast and secure. The technique, itself, consists of a Kurt-modified Chua's circuit (KMCC) for the generation of chaotic number sequences. The KMCC is a non-autonomous nonlinear circuit having hyper-chaotic character, thereby two positive Lyapunov exponents can easily make a strong ciphering action. The method is efficient for the images used in energy plants and networks. The algorithm created for the encryption/decryption uses a scrambling feature implemented at the bit level.
“…The image encryption procedure worked in this paper has been explained in Refs. [1,2,3], clearly. Therefore, in the current paper we do not give the details.…”
Section: Image Encryption Schemementioning
confidence: 95%
“…The row, column, color and other information algorithms from the hash key definition can be found clearly in Refs. [1,2].…”
Section: Image Encryption Schemementioning
confidence: 99%
“…Achievements in information and network technologies take the image security to an important position [1][2][3]. The secret communication has been used especially for important industrial projects and military applications.…”
Section: Introductionmentioning
confidence: 99%
“…
A recently proposed secure communication technique in Refs. [1,2,3] is initially applied to the energy sector. For this, especially the energy sector images which have a secret character for the companies and sectoral institutions have been ciphered and deciphered successfully.
A recently proposed secure communication technique in Refs. [1,2,3] is initially applied to the energy sector. For this, especially the energy sector images which have a secret character for the companies and sectoral institutions have been ciphered and deciphered successfully. The applied tests have proven that the proposed method is fast and secure. The technique, itself, consists of a Kurt-modified Chua's circuit (KMCC) for the generation of chaotic number sequences. The KMCC is a non-autonomous nonlinear circuit having hyper-chaotic character, thereby two positive Lyapunov exponents can easily make a strong ciphering action. The method is efficient for the images used in energy plants and networks. The algorithm created for the encryption/decryption uses a scrambling feature implemented at the bit level.
“…These test images (Flowers, Frog, Peppers, Cameraman, Lena, Baboon, Airplane, Wind map, Landscape and White) are encrypted 20 times using the proposed algorithm with different system parameters. In addition, some important analysis results have been compared with a similar study [19] recently presented. For the entropy comparison, the average values of the R, G and B layers of the test images used by the author are taken as reference.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.