2010 International Conference on Web Information Systems and Mining 2010
DOI: 10.1109/wism.2010.74
|View full text |Cite
|
Sign up to set email alerts
|

Discrete Chaotic Exclusive OR Encryption of Digital Image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…Chaotic systems has chaotic characteristics like initial value sensitivity and ergodicity, which can generate pseudo-random sequences of specified length with superior performance when given the initial value, parameters and the number of iterations [27].…”
Section: Chaotic Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…Chaotic systems has chaotic characteristics like initial value sensitivity and ergodicity, which can generate pseudo-random sequences of specified length with superior performance when given the initial value, parameters and the number of iterations [27].…”
Section: Chaotic Systemmentioning
confidence: 99%
“…Sine-transform-based chaotic system Classical one-dimensional chaotic systems are widely used to generate chaotic sequences because of their simple form and good performance. By performing a sine transform to the combination of the outputs of two existing one-dimensional chaotic maps (seed maps), sine-transform-based chaotic system (STBCS) proposed by Hua et al [27] has much larger chaotic ranges, better complexity and unpredictability compared with corresponding classical seed maps [29]. In this paper, we use the linear combination of one-dimensional sin map and the other above four one-dimensional maps with excellent chaotic performance as the seed maps respectively to obtain the four-dimensional sine-transform-based chaotic system for the proposed image encryption.…”
Section: Sine Mapmentioning
confidence: 99%
See 1 more Smart Citation
“…At the same time, the serious challenges in the field of information security are increasingly highlighted, such as military secret images, satellite monitoring images, medical diagnostic images and so on. Therefore, a certain degree of security and privacy protection for classified information is becoming more and more important [1], and the security protection of image data always occupies an important position in the field of information security, and image encryption and decryption technology is an important method to implement image information protection, and it is also an effective way to solve the security transmission of images in the network.…”
Section: Introductionmentioning
confidence: 99%