2020
DOI: 10.1109/access.2020.2966264
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz

Abstract: In recent years, experts and scholars in the field of information security have attached great importance to the security of image information. They have proposed many image encryption algorithms with higher security. In order to further improve the security level of image encryption algorithm, this paper proposes a new image encryption algorithm based on two-dimensional Lorenz and Logistic. The encryption test of several classic images proves that the algorithm has high security and strong robustness. This pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
35
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 66 publications
(37 citation statements)
references
References 39 publications
2
35
0
Order By: Relevance
“…In [38], a new image encryption scheme was proposed that focuses on two-dimensional Lorenz and Logistic. In the encryption system, the classic chaotic method is used to produce two pairs of chaotic sequence data to encode the image.…”
Section: Chaotic Image Cryptography Systems 2020mentioning
confidence: 99%
See 1 more Smart Citation
“…In [38], a new image encryption scheme was proposed that focuses on two-dimensional Lorenz and Logistic. In the encryption system, the classic chaotic method is used to produce two pairs of chaotic sequence data to encode the image.…”
Section: Chaotic Image Cryptography Systems 2020mentioning
confidence: 99%
“…Moreover, we analyse the pros and cons of each technique. The researches [8], [19], [22], [26], [27], [28], [38], [40] and [45] use the standard chaotic map in their algorithms. These algorithms were characterized by their simplicity of work and speed of implementation, but the disadvantage is the ability to break the keys because they rely on the chaotic key only [32].…”
Section: -Analysis Of Chaotic Cryptographymentioning
confidence: 99%
“…As the µ value changes, the Logistic map will have a perioddoubling bifurcation. When 3.569 ≤ µ ≤ 4 the system enters a chaotic state [14]- [17]. At this time, the sequence generated by the system iteration is a non-periodic and nonconvergent pseudo-random sequence.…”
Section: A Logistic Mappingmentioning
confidence: 99%
“…Differential attack is a type of plaintext attack. If the slight change of plaintext can cause more than half of the pixel value of ciphertext to change, differential attack can be considered invalid -0.0019 -0.0024 0.0011 [17] -0.0007 0.0019 0.0430 [38] -0.0245 -0.0226 -0.0193 NPCR and UACI were calculated as follows.…”
Section: ) Differential Attack Analysismentioning
confidence: 99%
“…Cryptography [ 9 ] is categorized into two types: symmetric-key cryptography in which same key is used for encryption and decryption; when different keys are used, it is called asymmetric-key cryptography. With the increase use of image for information sharing, image encryption [ 10 ] gained lot of demand in the digital era. Different algorithms are used for image encryption ranging from mathematical operations on individual pixels to blocks of pixels.…”
Section: Introductionmentioning
confidence: 99%