2014 Fifth International Conference on Signal and Image Processing 2014
DOI: 10.1109/icsip.2014.80
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption Using Chaotic Maps: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
32
0
4

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 73 publications
(36 citation statements)
references
References 5 publications
0
32
0
4
Order By: Relevance
“…The circular shifts to be performed in the algorithm are given by two randomly generated vectors (one vector related with rows and another associated with the columns). The assessment of the efficacy of the propounded approach is highly sensitive when compared to existing cryptosystems …”
Section: Rubik's Cube Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The circular shifts to be performed in the algorithm are given by two randomly generated vectors (one vector related with rows and another associated with the columns). The assessment of the efficacy of the propounded approach is highly sensitive when compared to existing cryptosystems …”
Section: Rubik's Cube Algorithmmentioning
confidence: 99%
“…The assessment of the efficacy of the propounded approach is highly sensitive when compared to existing cryptosystems. [21][22][23] The Rubik's cube principle is used to disturb the order of the pixels existing in the original image. This process alters the position of the pixels.…”
Section: Rubik's Cube Algorithmmentioning
confidence: 99%
“…Bu çalışmada öne sürülen yöntem ile [2]' de incelenen yöntemler karşılaştırıldığında daha iyi sonuçların elde edildiği açıkça görülmektedir.…”
Section: B Korelasyon Analiziunclassified
“…Resim şifreleme ayrıca verinin şifrelenme oranına göre tam şifreleme ya da kısmi şifreleme olarak da sınıflandırılmaktadır [2]. Kaotik ve kaotik olmayan resim şifreleme algoritmaları üç temel fikre sahiptir.…”
Section: Introductionunclassified
“…The use of chaos-based encryption schemes has expanded steadily over the last few years. Sankpal and Vijaya [9] provided the insights on chaos-based image encryption. Chaotic encryption mechanisms with infinite precision and unpredictability are sensitive to initial conditions and chaotic parameters.…”
Section: Introductionmentioning
confidence: 99%