2018
DOI: 10.1016/j.sigpro.2018.01.026
|View full text |Cite
|
Sign up to set email alerts
|

Integrated chaotic systems for image encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
80
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 211 publications
(80 citation statements)
references
References 40 publications
0
80
0
Order By: Relevance
“…Although the semantic characteristics change, the histogram is the same as the original image. Arnold transform is also called an image encryption technique that is sensitive to initial values and resistant to differential attacks [36,37]. In general, Arnold transform is mostly done on two-dimensional matrices that are defined as in Eq.…”
Section: Arnold Transformmentioning
confidence: 99%
“…Although the semantic characteristics change, the histogram is the same as the original image. Arnold transform is also called an image encryption technique that is sensitive to initial values and resistant to differential attacks [36,37]. In general, Arnold transform is mostly done on two-dimensional matrices that are defined as in Eq.…”
Section: Arnold Transformmentioning
confidence: 99%
“…High dimension chaotic systems possess complex chaotic behavior, while 1D chaotic systems are convenient for implementation. Under synthetical consideration, some combined chaotic maps have been explored in recent encryption schemes [2,[9][10][11][12]. Just resembling the series-parallel connection of resistors in circuits, these chaotic maps are a combination or adjustment of the original chaotic maps.…”
Section: Introductionmentioning
confidence: 99%
“…Although the results show that both the pixel correlation and structural similarity index metrics are good, it has poor ability for noise attack. Lan et al combine the sharing matrix and image encryption for lossless (k, n)secret image sharing [27]. is approach introduces the (k, n) sharing matrix producing algorithm, and it combines the sharing matrix with chaos encryption to do image encryption.…”
Section: Introductionmentioning
confidence: 99%