2019
DOI: 10.1049/iet-ipr.2018.5900
|View full text |Cite
|
Sign up to set email alerts
|

Novel image encryption algorithm based on improved logistic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
42
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 74 publications
(54 citation statements)
references
References 26 publications
0
42
0
Order By: Relevance
“…However, the traditional chaotic systems such as the quadratic and logistic maps have some shortcomings such as non‐uniform data distribution and a limited range of chaotic conducts of generated pseudo random streams [11, 12], the chaotic maps that have weak chaotic conductance can make the cryptosystems easy to be cracked. Recently, several researchers have suggested improved chaotic maps to beat their shortcomings, thus to obtain improved features of chaotic distribution [9, 13–15].…”
Section: Introductionmentioning
confidence: 99%
“…However, the traditional chaotic systems such as the quadratic and logistic maps have some shortcomings such as non‐uniform data distribution and a limited range of chaotic conducts of generated pseudo random streams [11, 12], the chaotic maps that have weak chaotic conductance can make the cryptosystems easy to be cracked. Recently, several researchers have suggested improved chaotic maps to beat their shortcomings, thus to obtain improved features of chaotic distribution [9, 13–15].…”
Section: Introductionmentioning
confidence: 99%
“…As suggested in [ 2 ], the main techniques used to develop image encryption algorithms can roughly be divided into the following six categories: chaotic map, DNA computing, cellular automata, wavelet transmission, neural networks, and compressive sensing. The extreme initial value sensitivity and high randomness of the chaotic systems make the chaotic maps the most popular tool in digital image encryption algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Introduction of chaos theory in cryptography has secured a tremendous response in image encryption techniques. Owing to the properties namely stochasticity, ergodicity, sensitive to initial conditions and large perturbations, chaos became the fruitful source for medical image encryption [6–8].…”
Section: Introductionmentioning
confidence: 99%