2021
DOI: 10.1007/s11042-021-10970-5
|View full text |Cite
|
Sign up to set email alerts
|

Novel pseudo random key & cosine transformed chaotic maps based satellite image encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 21 publications
(4 citation statements)
references
References 61 publications
0
3
0
Order By: Relevance
“…( 20), and next three sequences CR,CG and CB are generated by the inverse BCPIV process, subsequently, three sequences R_2, G_2, B_2 are produced by Eqs. (21)(22)(23)(24)(25)(26), finally the three sequences obtained are recombined to obtain the color decrypted image.…”
Section: Decryption Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…( 20), and next three sequences CR,CG and CB are generated by the inverse BCPIV process, subsequently, three sequences R_2, G_2, B_2 are produced by Eqs. (21)(22)(23)(24)(25)(26), finally the three sequences obtained are recombined to obtain the color decrypted image.…”
Section: Decryption Algorithmmentioning
confidence: 99%
“…Because of its pseudo randomness and sensitivity to initial parameters, chaotic systems [26,27] are used by many encryption projects. Wang et al [28] proposed a novel onedimensional chaotic map generator and applied it in a new index-representation-based image encryption scheme.…”
Section: Introductionmentioning
confidence: 99%
“…This chaotic behavior can be used to perform complex information processing tasks, such as remote heart rate measurement [18]. Chaotic systems have high complexity and randomness and can produce pseudorandom sequences [19,20]. Additionally, it is suitable to utilize chaotic systems for secure image transmission.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years the chaotic theory has been adopted for image and video encryption due to its excellent features such as complex and unpredictable behavior, initial condition dependency, randomness, and ergodicity. The main principal of chaotic security mechanism is permutation and diffusion [8][9][10][11]. Permutation changes the pixel positions in a frame or an image.…”
Section: Introductionmentioning
confidence: 99%