2020
DOI: 10.1109/access.2020.3032403
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Image Encryption Scheme Using Henon Map, Dynamic S-Boxes and Elliptic Curve Cryptography

Abstract: Image encryption schemes can be vulnerable to a variety of cryptanalysis attacks. The use of key-dependent dynamic S-boxes has been shown to improve security. Threats of chosen-plaintext and chosen-ciphertext attacks still linger. In this paper, we present an efficient algorithm for constructing secure dynamic S-boxes derived from Henon map. We use the proposed dynamic S-box to construct an image encryption scheme that includes a novel combination of security features to resist chosen-plaintext and chosen-ciph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
26
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 58 publications
(27 citation statements)
references
References 81 publications
1
26
0
Order By: Relevance
“…To prove the effectiveness of the proposed method, and to prove why we used Table 2 for different correlation coefficients, Lyapunov's exponent (LE) analysis is employed. Maps with a larger positive Lyapunov exponent have a larger chaotic range [14,31,32]. Here we prove the efficiency of the proposed method for ST (combined of Sine and Tent maps), and there is a similar proof for other combined maps.…”
Section: Theoretical Analysissupporting
confidence: 68%
See 1 more Smart Citation
“…To prove the effectiveness of the proposed method, and to prove why we used Table 2 for different correlation coefficients, Lyapunov's exponent (LE) analysis is employed. Maps with a larger positive Lyapunov exponent have a larger chaotic range [14,31,32]. Here we prove the efficiency of the proposed method for ST (combined of Sine and Tent maps), and there is a similar proof for other combined maps.…”
Section: Theoretical Analysissupporting
confidence: 68%
“…The behavior of the Henon map depends on the value of and b. For a ϵ (0.54, 2), and b ϵ (0, 1), it shows chaotic behavior [30,31]. Due to the fact that this paper uses Henon map for confusion phase and changing the coordinates of the image pixels, so for the N×N image:…”
Section: Henon Mapmentioning
confidence: 99%
“…Several image encryption schemes depend on chaotic masking without scrambling such as [6][7][8][9][10][11]. The scheme proposed in [6] generates a chaotic sequence to XOR with plain image pixels and then applies a dynamic S-box substitution to produce the cipher image.…”
Section: A Chaotic Image Encryptionmentioning
confidence: 99%
“…The authors introduced an image encryption framework with provable security characteristics by combining chaotic masking and dynamic substitution boxes. Similarly, the work of [11] proposed a secure image encryption scheme based on Henon map because of its high computational speed. However, all chaotic maps used in these works are sequentially computed.…”
Section: A Chaotic Image Encryptionmentioning
confidence: 99%
See 1 more Smart Citation