2014 International Conference on Advances in Electronics Computers and Communications 2014
DOI: 10.1109/icaecc.2014.7002404
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

1
27
1
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 40 publications
(30 citation statements)
references
References 14 publications
1
27
1
1
Order By: Relevance
“…AES, RSA and DES are the available encryption algorithms, which involves a great number of computations. Chaos theory is a study of mathematics and it is practiced in many of the emerging areas like cardiology, EEG analysis, communication and weather prediction [1]. Chaos is extremely sensitive to initial conditions and it means a state of disorders.…”
Section: Introductionmentioning
confidence: 99%
“…AES, RSA and DES are the available encryption algorithms, which involves a great number of computations. Chaos theory is a study of mathematics and it is practiced in many of the emerging areas like cardiology, EEG analysis, communication and weather prediction [1]. Chaos is extremely sensitive to initial conditions and it means a state of disorders.…”
Section: Introductionmentioning
confidence: 99%
“…These systems generate aperiodic signals whose evolution, seen from the outside, lies on the edges between random and deterministic worlds. Therefore, the chaotic oscillators are of major interest for the generation of pseudo-random signals [3,4], or for the encryption of data [5][6][7], speech [8] or images [9][10][11][12]. Various modulation schemes, like the chaos shift keying, use a chaotic carrier in order to secure the transmission and to reinforce its confidentiality [13,14].…”
Section: Introductionmentioning
confidence: 99%
“…Esse problemaé ressaltado ao tratar de imagens em meios de comunicação online [4]. Uma das propostas atuais para criptografia de imagensé a utilização de sistemas caóticos e o aprimoramento de geradores para cifragem em fluxo, sendo utilizado inclusive combinacão dessas duas técnicas, como em [15] [16].…”
Section: Introductionunclassified