2020
DOI: 10.11591/ijeecs.v18.i1.pp101-111
|View full text |Cite
|
Sign up to set email alerts
|

Parallelizable cipher of color image based on two-dimensional chaotic system

Abstract: This paper aims to present a parallel implementation based color image encryption using non -linear chaotic system. The adopted chaotic system was suggested and approved in our previous work [1] which generates key streams with chaotic behavior. In this paper, pixel level permutation algorithm based on chaotic map generation is investigated and analyzed. The encryption–decryption schemes are achieved in parallel and composed of three main phases: chaotic keys generation, pixel-level permutation and bit-level d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
2
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 18 publications
2
2
0
1
Order By: Relevance
“…Table 4 illustrates a comparison between our approach and some similar approaches. This comparison proves that our approach is significantly better than the other compared algorithms [21], [24]- [30]. This validates the resistance of our cryptosystem to differential attacks.…”
Section: Npcr and Uaci Metrics Analysissupporting
confidence: 78%
See 2 more Smart Citations
“…Table 4 illustrates a comparison between our approach and some similar approaches. This comparison proves that our approach is significantly better than the other compared algorithms [21], [24]- [30]. This validates the resistance of our cryptosystem to differential attacks.…”
Section: Npcr and Uaci Metrics Analysissupporting
confidence: 78%
“…This verifies the security of our cryptosystem against statistical attacks. Table 3 illustrates a comparison between our approach and some similar approaches [21], [23], [24]. These results validate the resistance of our cryptosystem to statistical attacks.…”
Section: Analysis Of Entropysupporting
confidence: 67%
See 1 more Smart Citation
“…In [32], the practical mobile traffic had been designed based on utilized the deep learning as a viable strategy. This classifier was proposed to extract the features automatically and it has capability to deal with encrypted traffic, then reflecting their complex patter of traffic, while in [33]- [36], multi classifier have been proposed for mobile application traffic based on different approaches for instance Markov modeling, capture, and ground-truth creation. Finally, the general comparisons of the previous video encryption schemes that demonstrated in the literature are illustrated in Table 1.…”
Section: Related Workmentioning
confidence: 99%
“…Also, sharing on the data communication network is one of the main security challenge [2]. Consequently, the main goal of security is to protect the vital information from illegal interception, tampering and distribution over the networks without authorised access [3], [4]. Ensuring that information is secure has become very important in several fields, such as medical imaging, internet communication, military communication, telemedicine, and multimedia systems.…”
Section: Introductionmentioning
confidence: 99%