2022
DOI: 10.1007/s11042-022-12621-9
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using chaotic map and cellular automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…Cellular automata have long been used for construction of cryptographic primitives [7][8][13][14][15][16][17][18][19][20][21]. Frequently, the elementary one-dimensional cellular automata are used for generation of binary pseudo-random sequences, which have decent statistical characteristics [14][15][16][17][18][19].…”
Section: A Cellular Automata In Cryptographic Transformationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Cellular automata have long been used for construction of cryptographic primitives [7][8][13][14][15][16][17][18][19][20][21]. Frequently, the elementary one-dimensional cellular automata are used for generation of binary pseudo-random sequences, which have decent statistical characteristics [14][15][16][17][18][19].…”
Section: A Cellular Automata In Cryptographic Transformationsmentioning
confidence: 99%
“…Cellular automata have long been used for construction of cryptographic primitives [7][8][13][14][15][16][17][18][19][20][21]. Frequently, the elementary one-dimensional cellular automata are used for generation of binary pseudo-random sequences, which have decent statistical characteristics [14][15][16][17][18][19]. There are known applications of CA for design of hashing algorithms [4,5], block ciphers [7,[22][23] and stream encryption algorithms [7-8, 14-15, 17-19], etc.…”
Section: A Cellular Automata In Cryptographic Transformationsmentioning
confidence: 99%
“…To protect the image-content security, many image encryption algorithms have been proposed. They are based on various techniques, such as the compressed sensing [5][6][7], Latin square [8], S-box [9,10], quantum system [11][12][13], cellular automata [14][15][16], and neural network [17,18].…”
Section: Introductionmentioning
confidence: 99%