2022
DOI: 10.1007/s10207-022-00588-5
|View full text |Cite
|
Sign up to set email alerts
|

Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains

Abstract: Chaos-based cryptosystems have been an active area of research in recent years. Although these algorithms are not standardized like AES, DES, RSA, etc., chaos-based cryptosystems like Chebyshev polynomials can provide additional security when used with standard public key cryptosystems like RSA and El-gamal. Standard encryption algorithms such as AES have always been the primary choice, but when it comes to image or video encryption, many researchers recommend chaos-based encryption techniques due to their com… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
42
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 86 publications
(43 citation statements)
references
References 137 publications
0
42
0
1
Order By: Relevance
“…The capacity of chaotic maps to produce seemingly random sequences that are extremely sensitive to the original seed point is one of its most crucial characteristics [30], [31]. There are different kinds of chaotic maps, and three of them will be discussed in the following section besides the implementation of the suggested algorithms based on both of them are examined:…”
Section: Chaos-based Video Encryptionmentioning
confidence: 99%
“…The capacity of chaotic maps to produce seemingly random sequences that are extremely sensitive to the original seed point is one of its most crucial characteristics [30], [31]. There are different kinds of chaotic maps, and three of them will be discussed in the following section besides the implementation of the suggested algorithms based on both of them are examined:…”
Section: Chaos-based Video Encryptionmentioning
confidence: 99%
“…The main reason is applying chaotic systems, i.e. piecewise chaotic map, that they are very sensitive to minor changes [17], [18]. Two tests are used for this: key space and key sensitivity, both of which are described in detail.…”
Section: ) Key Analysismentioning
confidence: 99%
“…The objective of perceptional hash algorithms is to generate hash codes that take only changes in the district region into account. In contrast to image hashing algorithms, few other techniques such as watermarking [6], cryptography [7], and image encryption [8][9][10] have been developed to transmit data through a secured channel or hide it. However, with such methodologies, it is difficult to detect and localize the tampered region.…”
Section: Introductionmentioning
confidence: 99%