Computation, Cryptography, and Network Security 2015
DOI: 10.1007/978-3-319-18275-9_25
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption Scheme Based on Non-autonomous Chaotic Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 40 publications
0
2
0
Order By: Relevance
“…The inherent properties of chaotic systems, such as sensitivity to initial conditions, unpredictability, and complex behavior, make them suitable for many applications, including image encryption [29][30][31]. These complex dynamics can be useful in generating pseudo-random numbers as encryption keys.…”
Section: Introductionmentioning
confidence: 99%
“…The inherent properties of chaotic systems, such as sensitivity to initial conditions, unpredictability, and complex behavior, make them suitable for many applications, including image encryption [29][30][31]. These complex dynamics can be useful in generating pseudo-random numbers as encryption keys.…”
Section: Introductionmentioning
confidence: 99%
“…Security and communications systems today, including financial security, RFID, and cryptography, rely on this idea of randomness Sundaresan et al (2015); Volos (2013). Specifically, these technologies depend heavily on random bits being readily available to process into various encryption schemes.…”
Section: Introductionmentioning
confidence: 99%