2020
DOI: 10.5614/itbj.ict.res.appl.2020.14.2.3
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Image Encryption Using Two Chaotic Maps

Abstract: Information security is an important aspect in various communication areas, multimedia frameworks, medical imaging and militant communications. However, most of them encounter issues such as insufficient robustness or security. Recently, the approach of achieving information security by using chaotic techniques has gained popularity, since they provide ergodic and random generated keys. This paper introduces a combination of two chaotic maps (3D logistic map and Arnold's cat map) that meet the general security… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 16 publications
(24 reference statements)
0
2
0
Order By: Relevance
“…A. Enhanced Image Encryption using Chaotic Maps [1] A research paper by S. Patel and J. Lee [1] titled "Enhanced Image Encryption using Chaotic Maps" published in August 2020 presents an innovative approach to image encryption. It focuses on advanced encryption techniques and uses chaotic maps to introduce increased security by infusing randomness into the encryption process.…”
Section: Literature Survey Overviewmentioning
confidence: 99%
“…A. Enhanced Image Encryption using Chaotic Maps [1] A research paper by S. Patel and J. Lee [1] titled "Enhanced Image Encryption using Chaotic Maps" published in August 2020 presents an innovative approach to image encryption. It focuses on advanced encryption techniques and uses chaotic maps to introduce increased security by infusing randomness into the encryption process.…”
Section: Literature Survey Overviewmentioning
confidence: 99%
“…The primary purpose of the histogram is to determine the distribution of the pixels of the image and obtain relevant information. The encryption process aims to remove the differences between the pixels, which prevents the attacker from obtaining information that helps to reveal the image [21], [22]. Figure 5…”
Section: Histogram Analysismentioning
confidence: 99%
“…A histogram is employed to determine how pixels are arranged in an image and to learn more about the image's features. One method for attackers to discover an original image is to get the histogram of the encrypted image [27].…”
Section: Histogram Analysismentioning
confidence: 99%