2012
DOI: 10.1364/oe.20.002363
|View full text |Cite
|
Sign up to set email alerts
|

A chaos-based digital image encryption scheme with an improved diffusion strategy

Abstract: Chaos-based image cipher has been widely investigated over the last decade or so to meet the increasing demand for real-time secure image transmission over public networks. In this paper, an improved diffusion strategy is proposed to promote the efficiency of the most widely investigated permutation-diffusion type image cipher. By using the novel bidirectional diffusion strategy, the spreading process is significantly accelerated and hence the same level of security can be achieved with fewer overall encryptio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
94
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
5

Relationship

2
8

Authors

Journals

citations
Cited by 246 publications
(95 citation statements)
references
References 22 publications
1
94
0
Order By: Relevance
“…Mohammad Seyedzadeh [11] presented some chaos-based image cryptosystems. In this revision, the author proposed a chaos-based IE algorithm, to encrypt the color images by using Coupled Twodimensional Piecewise Nonlinear Chaotic Map (CTPNCM).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Mohammad Seyedzadeh [11] presented some chaos-based image cryptosystems. In this revision, the author proposed a chaos-based IE algorithm, to encrypt the color images by using Coupled Twodimensional Piecewise Nonlinear Chaotic Map (CTPNCM).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Hence following security problems were found: 1) the schemes are not sensitive to change of plain-image; 2) the schemes are not sensitive to change of secret key; 3) there exist a serious flaws of diffusion function; 4) the schemes can be broken with no more than [log l (MN)+3] chosen images when iteration number is equal to one, where MN is dimension of image. Chong Fu et.al [15] have used , Chirikov standard map , to decor relate the strong relationship among adjacent pixels hence employed to shuffle the pixel positions of the plain image. After the decor relating the pixels , the pixel values are modified sequentially to confuse the relationship between cipher image and plain image.…”
Section: Litreature Reviewmentioning
confidence: 99%
“…It has been demonstrated that images recovered from the damaged cipher data have satisfactory visual perception. In [20], Fu et al introduced a novel bidirectional diffusion strategy to minimize the number of encryption rounds needed to spread the influence of each individual pixel over the entire cipherimage. Experimental results have demonstrated that their scheme takes one round of permutation and two rounds of substitution to obtain a satisfactory diffusion effect.…”
Section: Introductionmentioning
confidence: 99%