2013
DOI: 10.1016/j.sigpro.2013.04.021
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using a new parametric switching chaotic system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
66
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 243 publications
(66 citation statements)
references
References 35 publications
0
66
0
Order By: Relevance
“…If the value in right (or down, lower -right) corner does not exist within CML block, other values should be selected in left (or top, upper left) corner to replace. Based on these pixels, the values are calculated by following rules to fill in the substitution table T. Just take the pixel for example, the pixel is selected from CML block, and then we will finish the first column in substitution Table T Step 4 Use another logistic map to get a sequence M , modify its value range within [1,4] by formula (6). Especially, we get the initial value x0 for logistic map by Formula (5).…”
Section: Image Block Diffusion Phasementioning
confidence: 99%
See 1 more Smart Citation
“…If the value in right (or down, lower -right) corner does not exist within CML block, other values should be selected in left (or top, upper left) corner to replace. Based on these pixels, the values are calculated by following rules to fill in the substitution table T. Just take the pixel for example, the pixel is selected from CML block, and then we will finish the first column in substitution Table T Step 4 Use another logistic map to get a sequence M , modify its value range within [1,4] by formula (6). Especially, we get the initial value x0 for logistic map by Formula (5).…”
Section: Image Block Diffusion Phasementioning
confidence: 99%
“…Most methods have been proposed on the chaotic image encryption [2][3][4][5][6][7][8][9], but many have proved the weak security for some chaotic encryption schemes [10][11][12][13]. Most common problems among unsecured encryption schemes are the chaotic dynamics degradation.…”
Section: Introductionmentioning
confidence: 99%
“…The permutation is achieved by scrambling all the pixels as a whole using 2D chaotic map (such as Baker map, Arnold cat map etc.) [3,4,10,12]. During diffusion, the pixel values are modified sequentially and the change made to a particular pixel depends on the accumulated effect of all the previous pixel values.…”
Section: Literature Surveymentioning
confidence: 99%
“…The substitution process is initialized with the initial vectors generated via the cipher keys and chaotic standard map, and then the pixel gray values of row and column pixels of input 2D matrix are bitwise exclusive OR with the pseudo-random number sequences. Zhou et al introduced new chaotic systems by integrating the tent, Logistic and sine maps into one single system to produce the pseudo-random sequence [18,19]. The intertwining Logistic map and reversible cellular automata were applied in an image encryption scheme presented by Wang et al in [20].…”
Section: Introductionmentioning
confidence: 99%