2017
DOI: 10.1007/s00521-017-3195-1
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 63 publications
(32 citation statements)
references
References 21 publications
0
32
0
Order By: Relevance
“…[20] proposed the use of a hyperchaotic system to scramble and diffuse images to achieve the purpose of image encryption. [21] proposed a discrete Lorenz map applied to compressed data, and applied the algorithm in the field of image encryption. [22] Utilizing the characteristics of quaternions, a new S-box was constructed based on the Lorenz system.…”
Section: Introductionmentioning
confidence: 99%
“…[20] proposed the use of a hyperchaotic system to scramble and diffuse images to achieve the purpose of image encryption. [21] proposed a discrete Lorenz map applied to compressed data, and applied the algorithm in the field of image encryption. [22] Utilizing the characteristics of quaternions, a new S-box was constructed based on the Lorenz system.…”
Section: Introductionmentioning
confidence: 99%
“…Chaotic theory has been heavily used in designing secure communication protocols since the 1990s [10][11][12][13][14][15], while chaotic maps have been utilized in the design of symmetric encryption protocols in [16][17][18][19]. Designing a chaotic map setting is usually difficult, but generally creates secure and efficient protocols.…”
Section: Chaotic Mapsmentioning
confidence: 99%
“…Lorenz system is a dynamical system which was studied first by Edward Norton Lorenz around 1960 [24], This chaotic system is described by non-linear system of ordinary differential equations (i.e., ODEs) as given in (1).…”
Section: Lorenz Chaotic Systemmentioning
confidence: 99%
“…To ensure the security against brute-force attacks, the excellent encrypted speech quality must be sensitive in extreme way with respect to the secret keys [24,29]. In the proposed algorithm, any slightly change (i.e., bit flip) on the following sensitivity factors: hash values, keys, and other encryption keys such as parameters that would generate a completely different decryption results as shown in Figure 7.…”
Section: Key Sensitivity Testmentioning
confidence: 99%