2014
DOI: 10.3923/rjit.2014.207.215
|View full text |Cite
|
Sign up to set email alerts
|

Rubik's Cube Blend with Logistic Map on RGB: A Way for Image Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
4

Relationship

3
5

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 38 publications
0
10
0
Order By: Relevance
“… Finally, when the value of count = count max , then the encrypted image I ENC is created, and the encryption process is done; otherwise, the algorithm loops to step 3. The decryption is the reverse process of the encryption algorithm. Full details regarding the Rubik's cube algorithm and its implementation can be found in previous studies …”
Section: Rubik's Cube Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“… Finally, when the value of count = count max , then the encrypted image I ENC is created, and the encryption process is done; otherwise, the algorithm loops to step 3. The decryption is the reverse process of the encryption algorithm. Full details regarding the Rubik's cube algorithm and its implementation can be found in previous studies …”
Section: Rubik's Cube Algorithmmentioning
confidence: 99%
“…Full details regarding the Rubik's cube algorithm and its implementation can be found in previous studies. [24][25][26]…”
Section: Rubik's Cube Algorithmmentioning
confidence: 99%
“…Information hiding techniques [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26] can be classified into reversible [20] and irreversible information hiding [21]. In irreversible technique, extraction of the message alone is concentrated leaving behind the cover.…”
Section: Introductionmentioning
confidence: 99%
“…A well destined algorithm let the accredited heritor to decrypt the information with the key provided by the sender [21][22][23][24][25]. Thus one can visualize that there is no similarity between the original and the encrypted image.…”
Section: Introductionmentioning
confidence: 99%