2020
DOI: 10.1049/iet-ipr.2019.0671
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using a combination of Grain‐128a algorithm and Zaslavsky chaotic map

Abstract: Encryption is a very important way to secure data in storage and communication, and it is a process of encoding messages or information in such a manner that only authorised persons can access it. Different techniques are used to protect confidential image data against illicit access. In image encryption using chaotic systems, most authors use or design algorithms to generate the initial parameters’ values from the secret key. However, as the key size depends on the number of these parameters, the used algorit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…Balaska et al [8] merged the Grain-128a stream cipher technique with a 2D Zaslavsky chaotic map to increase sensitivity and security in the initial parameter selection. Then, to generate the chaotic map's needed parameters, a 256-bit secret key with a fixed length is used.…”
Section: Related Workmentioning
confidence: 99%
“…Balaska et al [8] merged the Grain-128a stream cipher technique with a 2D Zaslavsky chaotic map to increase sensitivity and security in the initial parameter selection. Then, to generate the chaotic map's needed parameters, a 256-bit secret key with a fixed length is used.…”
Section: Related Workmentioning
confidence: 99%
“…Coupled Eq. ( 1) [17] is used to define the 2-D map: (1) Initial values are , and , and , , and are the regulating parameters used to monitor the predicted chaotic behavior, while e is the exponentiation [17], [18]. When the parameters r = 3.0, v = 400/3, and ε = 0.3 are set of the parameters, this map shows chaotic behavior [19].…”
Section: Introductionmentioning
confidence: 99%
“…Finally, the cipher image is obtained by random diffusion. In (14), proposes an image encryption using a combination of Grain-128a algorithm and Zaslavsky chaotic map; where a process of bit confusion and diffusion is applied using a sequences generated by the chaotic map. Despite the advantages of algorithms mentioned above, they have a number of inherent limitations.…”
Section: Introductionmentioning
confidence: 99%