2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR) 2015
DOI: 10.1109/socpar.2015.7492812
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption scheme for secure digital images based on 3D cat map and Turing machine

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…eir intervals are [0, 1], and if their values are 1, then the information is 100% reserved in the both encryption and decryption process. is indicator measures the efficiency and accuracy of the decryption process [31][32][33].…”
Section: Quality Evaluation Metrics Of Decryped Imagementioning
confidence: 99%
“…eir intervals are [0, 1], and if their values are 1, then the information is 100% reserved in the both encryption and decryption process. is indicator measures the efficiency and accuracy of the decryption process [31][32][33].…”
Section: Quality Evaluation Metrics Of Decryped Imagementioning
confidence: 99%
“…Chaotic systems possess a diffusion property of the initial condition and the control parameter with respect to the orbits, whereas the mixing property and the related ergodic behaviour of chaotic systems provide a good confusion property [21]. Cat map is a classical invertible 2D chaotic map that can be calculated as [20, 22])(1em4ptxn+1yn+1=)(1em4pt1112)(1em4ptxnynmod1,in which xn,ynfalsefalse{0,1falsefalse}; this map can be extended to 3D and generalised by introducing control parameters a x , a y , a z , b x , b y , b z :][xn+1yn+1zn+1=A][xnynznmod1,A=][1em4pt1+axazbyazay+axaz+axayazbybz+axby+axazbybzazbz+1ayaz+axayazbybz+axazbz+ax<...>…”
Section: Preliminaries and Related Workmentioning
confidence: 99%
“…The logistic map is a simple 1D discrete equation that produces chaos at certain growth rates; it is the more widely used chaotic maps [8, 12]. However, due to the weakness of cat maps in eliminating chosen plaintext attack [22], some enhancement was added to achieve more security. This enhancement depends on generating a random key based on the ROI region, each group of the generated key will be used further as the control parameters of the chaotic maps.…”
Section: Proposed Partial Encryption–compression Schemementioning
confidence: 99%
“…Digital images [10,11] are different from textual information due to their vivid and intuitive characteristics, such as bulk data capacity, high redundancy, and strong correlations between adjacent pixels. All these defects make conventional encryption algorithms [12,13], such as DES, AES, RSA, ECC, and IDEA, appear to be inappropriate for digital-image encryption due to their inefficiency and computational expenses. Therefore, image-information encryption [14] has become a major focus of research in the field of information security.…”
Section: Introductionmentioning
confidence: 99%