2000
DOI: 10.1049/ip-vis:20000208
|View full text |Cite
|
Sign up to set email alerts
|

Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
51
0

Year Published

2002
2002
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 115 publications
(54 citation statements)
references
References 7 publications
0
51
0
Order By: Relevance
“…• SCAN language based methods [16-19, 32, 33]: define some different scan patterns of the 2-D plaintext and combine these patterns to obtain a permutation matrix by scanning the whole plaintext particle by particle; • quadtree based methods [18,19]: divide the plaintext into multi-level quadtree and shuffle the order of four nodes in each level to realize a permutation matrix; • 2-D chaotic maps based methods [34][35][36]: iterate a discretized 2-D chaotic map over the M × N plaintext for many times to realize a permutation matrix; • Fractal curves based methods [14,15]: use a fractal(-like) curve to replace the normal scan order to realize a permutation matrix; • pseudo-random rotations based methods [20,23]: pseudo-randomly rotate particles along some straight lines for many times to realize a permutation matrix; • matrix transformation based methods [21]: use (integer) transformations of matrix, such as n-dimensional Arnold transformation and Fibonacci-Q transformation, to define permutation matrices; • composite methods [22]: combine different methods to realize more complicated permutation matrices.…”
Section: A General Model Of Permutation-only Multimedia Ciphersmentioning
confidence: 99%
“…• SCAN language based methods [16-19, 32, 33]: define some different scan patterns of the 2-D plaintext and combine these patterns to obtain a permutation matrix by scanning the whole plaintext particle by particle; • quadtree based methods [18,19]: divide the plaintext into multi-level quadtree and shuffle the order of four nodes in each level to realize a permutation matrix; • 2-D chaotic maps based methods [34][35][36]: iterate a discretized 2-D chaotic map over the M × N plaintext for many times to realize a permutation matrix; • Fractal curves based methods [14,15]: use a fractal(-like) curve to replace the normal scan order to realize a permutation matrix; • pseudo-random rotations based methods [20,23]: pseudo-randomly rotate particles along some straight lines for many times to realize a permutation matrix; • matrix transformation based methods [21]: use (integer) transformations of matrix, such as n-dimensional Arnold transformation and Fibonacci-Q transformation, to define permutation matrices; • composite methods [22]: combine different methods to realize more complicated permutation matrices.…”
Section: A General Model Of Permutation-only Multimedia Ciphersmentioning
confidence: 99%
“…With the properties of sensitivity to initial conditions and control parameters, pseudo-randomness and ergodicity, chaotic maps have been widely used in data encryption recently [1][2][3][4][5][6][7][8]. Compared with traditional cryptosystems [9], the ones based on chaos are easier to be realized, which makes it more suitable for large-scale data encryption such as images, videos or audio data.…”
Section: Introductionmentioning
confidence: 99%
“…In [23] and [24], there are a number of permutation-based image methods used. The original image should be in uncompressed format and each pixel have a gray value which may be between 0 and 255 , and that can be represented by 8 bits.…”
Section: Image Encryptionmentioning
confidence: 99%
“…Some algorithms for compressing encrypted data and demonstrate blind compression of encrypted video are presented in [21]. In the encryption domain, the signal processing using homomorphic calculation is discussed in [22] and [23].…”
Section: Introductionmentioning
confidence: 99%