2014
DOI: 10.1140/epjst/e2014-02119-9
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(22 citation statements)
references
References 8 publications
0
22
0
Order By: Relevance
“…The information entropy in the CCM-IEA algorithm, literature [8] and literature [9] is higher. And the value is relatively close to the ideal value of 8.…”
Section: Information Entropy Analysismentioning
confidence: 90%
See 3 more Smart Citations
“…The information entropy in the CCM-IEA algorithm, literature [8] and literature [9] is higher. And the value is relatively close to the ideal value of 8.…”
Section: Information Entropy Analysismentioning
confidence: 90%
“…M is shown as Equation (4) (4) Firstly, each pixel a ij is converted to the 8 bit binary sequence {a ij1 , a ij2 …a ij8 }. Among them, the value of a ijk is 0 or 1, k∈ [1,8]. A matrix M 1 can be got after the operation, which size is h×8w.…”
Section: The Bit Level Image Scramblingmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, DNA coding-based ciphers [1,2], S-box-based ciphers [3], compressive sensing-based ciphers [4,5], wave function-based ciphers [6], etc. Moreover, by virtue of the similitude to pixel matrix of digital image, Sudoku matrix [7] and Latin square [8] have also been utilized in image ciphers. Originating in the late 1990s, chaos theory-based encryption algorithms have developed significantly, and most of them employ a confusion-diffusion structure, which was first proposed by Fridrich [9].…”
Section: Introductionmentioning
confidence: 99%