2022
DOI: 10.1504/ijcsm.2022.122144
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using anti-synchronisation and Bogdanov transformation map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…Encryption techniques are introduced to change the data before transfer in order to preserve the privacy of parties participating in communication [109] or protect the confidentiality of the data from adversaries. In many cases, the transmitted measurement data has the form of a 2D graphic, which is compressed using image codecs [110]. In such cases, it is crucial to compress data with preservation of the quality suitable for further data processing and maintain security properties of encryption [111].…”
Section: Secure File Transfermentioning
confidence: 99%
“…Encryption techniques are introduced to change the data before transfer in order to preserve the privacy of parties participating in communication [109] or protect the confidentiality of the data from adversaries. In many cases, the transmitted measurement data has the form of a 2D graphic, which is compressed using image codecs [110]. In such cases, it is crucial to compress data with preservation of the quality suitable for further data processing and maintain security properties of encryption [111].…”
Section: Secure File Transfermentioning
confidence: 99%
“…This hinders the data sharing among the enterprises participating in FL, and cannot fully tap the potential value of the data, resulting in huge economic losses. It is necessary to design more superior encryption method and attack detection method to enhance the security of FL and defend more kinds of attack dangers [157]. To ensure data security and improve encryption efficiency, some hardware-based encryption techniques should also be focused on.…”
Section: Federated Leaning In Intrusion Detectionmentioning
confidence: 99%
“…Chaos-based cryptographic algorithms are an obvious choice for safe communication and cryptography because of the tight connection between the two fields [10]- [12]. Tight connection between cryptographic algorithms and chaotic maps can be seen in their sensitivity to changes in initial conditions and control parameters, pseudorandom behavior, and unstable periodic orbits with long periods [6], [13], [14]. In the multimedia data such as image can be encrypted using chaos because some dynamic systems are capable of producing random sequences of numbers that are difficult to predict.…”
Section: Chaos Theory For Cryptographymentioning
confidence: 99%
“…The diffusion stage follows the confusion stage, and the cipher image is created by XORing each pixel of the confused image with the diffused image. Al-hazaimeh et al [14] based on Chen system and Bogdanov map anti-synchronization, a new image encryption technique is proposed. In this paper, to demonstrate the new algorithm's performance and robustness against various cryptanalytic attacks, some of these analyses are presented in this paper.…”
Section: Chaos-based Encryption Algorithmsmentioning
confidence: 99%