2024
DOI: 10.1016/j.cageo.2024.105530
|View full text |Cite
|
Sign up to set email alerts
|

Commutative encryption and watermarking algorithm based on compound chaotic systems and zero-watermarking for vector map

Tao Tan,
Liming Zhang,
Mingwang Zhang
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…A nonlinear system exhibiting chaotic behavior should possess high sensitivity, ergodicity, unpredictability, and initial value sensitivity, as per Devaney’s definition [ 2 ]. These important properties make it popular in security applications such as audio encryption [ 3 , 4 ], image encryption [ 5 , 6 , 7 ], image watermarking [ 8 , 9 ], and data hiding [ 10 , 11 , 12 ]. For these chaotic-based applications, the security largely depends on the performance of the underlying chaotic system.…”
Section: Introductionmentioning
confidence: 99%
“…A nonlinear system exhibiting chaotic behavior should possess high sensitivity, ergodicity, unpredictability, and initial value sensitivity, as per Devaney’s definition [ 2 ]. These important properties make it popular in security applications such as audio encryption [ 3 , 4 ], image encryption [ 5 , 6 , 7 ], image watermarking [ 8 , 9 ], and data hiding [ 10 , 11 , 12 ]. For these chaotic-based applications, the security largely depends on the performance of the underlying chaotic system.…”
Section: Introductionmentioning
confidence: 99%