2016
DOI: 10.1049/iet-ipr.2015.0244
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption by chaos mixing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
45
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 79 publications
(49 citation statements)
references
References 31 publications
1
45
1
Order By: Relevance
“…In terms of the key space, it should be larger than 2 100 to defend from a brute force attack [9]. The key space of this work is larger than Ref [1,8,31,44,47], but smaller than the scheme in [10]. However the NPCR and UACI values in Ref [10] are smaller.…”
Section: Speed Analysis and Comparisonsmentioning
confidence: 90%
See 2 more Smart Citations
“…In terms of the key space, it should be larger than 2 100 to defend from a brute force attack [9]. The key space of this work is larger than Ref [1,8,31,44,47], but smaller than the scheme in [10]. However the NPCR and UACI values in Ref [10] are smaller.…”
Section: Speed Analysis and Comparisonsmentioning
confidence: 90%
“…However the NPCR and UACI values in Ref [10] are smaller. In addition, the proposed algorithm is faster than [1,10,31,44,47], but slower than [8]. Although the algorithm in the approach of [8] only takes 3.41ms for encryption, however this time is only for one round encryption.…”
Section: Speed Analysis and Comparisonsmentioning
confidence: 96%
See 1 more Smart Citation
“…In another work, Wang et al [24] used two chaotic systems to develop a hybrid color image encryption scheme. In [25], Abanda and Tiedeu proposed a fast and simple image encryption algorithm by combining two kinds of chaotic maps to meet real-time application. Belazi et al [26] presented a novel selective image encryption by using DWT with AES s-box and chaotic permutation.…”
Section: Introductionmentioning
confidence: 99%
“…Colpitts oscillators are used in many fields such as radars, sensors, convertors, chaos generators, encryption, etc. [1][2][3][4][5]. Due to their wide range of applications, they have attracted more attention in recent years.…”
Section: Introductionmentioning
confidence: 99%