2022
DOI: 10.1016/j.eswa.2021.116193
|View full text |Cite
|
Sign up to set email alerts
|

Robust image encryption and zero-watermarking scheme using SCA and modified logistic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(12 citation statements)
references
References 41 publications
0
5
0
Order By: Relevance
“…The proposed scheme achieves good robustness against various attacks. Daoui et al [ 19 ] offered copyright protection systems based on zero-watermarking and encryption techniques for images. They introduced modified logistic maps for image encryption.…”
Section: Related Workmentioning
confidence: 99%
“…The proposed scheme achieves good robustness against various attacks. Daoui et al [ 19 ] offered copyright protection systems based on zero-watermarking and encryption techniques for images. They introduced modified logistic maps for image encryption.…”
Section: Related Workmentioning
confidence: 99%
“…[6][7][8] However, in the face of increasingly complex networks and the emergence of advanced artificial intelligence such as Chat-GPT, image information is facing more severe security problems and copyright disputes, so scholars are beginning to focus more attention on the field of image encryption and copyright protection. [9][10][11][12][13][14] Considering that traditional encryption methods (such as AES and DES) have been unable to improve the security of digital image transmission, [15][16][17] scholars tend to introduce more technologies in the field of image encryption, and chaos theory is one of them. [18][19][20]57] A chaotic system has the advantages of initial value sensitivity, unpredictability and so on, which can provide enough support for the application of cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…A large number of watermarking application schemes have also been proposed. [29][30][31][32] Bordel et al proposed a new mechanism to protect, authenticate and anonymize data in IoT systems supported by future 5G networks. [33] Pavithra et al introduced a medical image watermarking encryption scheme.…”
Section: Introductionmentioning
confidence: 99%
“…In the context of the Internet of Things (IoT), embedded devices are being positioned as a key hub for connecting the physical and digital worlds [1][2][3]. With the proliferation and expanding application scope of embedded devices, the volume of data they process is also rapidly increasing.…”
Section: Introductionmentioning
confidence: 99%
“…Typical dynamics of chaotic firingInspired by the works[15], the chaotic Rulkov model is shown in equation (1), , y n are the state variables, and various firing patterns are regulated by parameters a, b, c, and d. Set b = 0.01, c = -1, and d = 1, (x 0 , y 0 ) = (0, 0), a varies in the range of[2,5], the dynamical evolutions of the system (1) is shown in figure1. A weak chaotic range shows up as a varies in the range of[2,3]; the robust chaotic range is extracted when a is fixed in the range of[3,5]. Typical firing activities are shown in figure2, including periodic spiking and chaotic bursting.…”
mentioning
confidence: 99%