2007 15th International Conference on Digital Signal Processing 2007
DOI: 10.1109/icdsp.2007.4288613
|View full text |Cite
|
Sign up to set email alerts
|

Modified Chaotic Key-Based Algorithm for Image Encryption and its VLSI Realization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…The modulo addition then XORing operation, which is nonlinear and has low computational complexity, serves as the fundamental or even the only component in many image cryptosystems [2,14,15,16,17,4]. Mathematically, it can be expressed as…”
Section: Related Work and Main Resultsmentioning
confidence: 99%
“…The modulo addition then XORing operation, which is nonlinear and has low computational complexity, serves as the fundamental or even the only component in many image cryptosystems [2,14,15,16,17,4]. Mathematically, it can be expressed as…”
Section: Related Work and Main Resultsmentioning
confidence: 99%
“…These methods generate infinite cryptographic key streams to encrypt one bit or one byte in one slot. Different chaotic papers [8] [9] were used this method for image encryption. [10] Jui-Cheng and Jiun-In Guo proposed image encryption decryption algorithm in which gray level of each pixel is XORed or XNORed bit-by-bit to one of the two predetermined keys.…”
Section: Stream Encryptionmentioning
confidence: 99%
“…where ⊕ stands for bitwise exclusive or. Many other works adopt similar (or even the same) diffusion mechanisms, see [23,24,17,16,25,14,15,26,27,28] for examples. It is not surprising that the computational efficient modulo multiplication can also be incorporated into the diffusion stage [23,29].…”
Section: Introductionmentioning
confidence: 99%
“…It is further reduced to 2 pairs of chosen (α, β) in [39]. As far as we know, these works must be considered as independent analyses of particular image ciphers [26,25]. In our previous work [41], it was reported that the diffusion mechanism suggested by Chen et al [11] can be cast to the form (α ∔ k) ⊕ (β ∔ k) = y under CP attack and the similar method can be also used to analyze other DEA that includes modulo multiplication operation.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation