2016
DOI: 10.1007/s11042-016-3274-9
|View full text |Cite
|
Sign up to set email alerts
|

A fast ARX model-based image encryption scheme

Abstract: This paper proposes a novel ARX model-based image encryption scheme that uses addition, rotation, and XOR as its confusion and diffusion mechanism instead of S-Box and permutation as in SP networks. The confusion property of the proposed scheme is satisfied by rotation and XOR with chaotic sequences generated from two logistic maps. Unlike classical image encryption schemes that adopt S-Box or permutation of the entire plain image, the diffusion property is satisfied using addition operations. The proposed sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 30 publications
0
16
0
Order By: Relevance
“…In terms of the key space, it should be larger than 2 100 to defend from a brute force attack [9]. The key space of this work is larger than Ref [1,8,31,44,47], but smaller than the scheme in [10]. However the NPCR and UACI values in Ref [10] are smaller.…”
Section: Speed Analysis and Comparisonsmentioning
confidence: 90%
See 3 more Smart Citations
“…In terms of the key space, it should be larger than 2 100 to defend from a brute force attack [9]. The key space of this work is larger than Ref [1,8,31,44,47], but smaller than the scheme in [10]. However the NPCR and UACI values in Ref [10] are smaller.…”
Section: Speed Analysis and Comparisonsmentioning
confidence: 90%
“…However the NPCR and UACI values in Ref [10] are smaller. In addition, the proposed algorithm is faster than [1,10,31,44,47], but slower than [8]. Although the algorithm in the approach of [8] only takes 3.41ms for encryption, however this time is only for one round encryption.…”
Section: Speed Analysis and Comparisonsmentioning
confidence: 95%
See 2 more Smart Citations
“…The communication among connected things must be secure and fast while processing confidential data. Due to a substantial amount of sensitive and valuable data and low computational resources in the network, it has become cumbersome to provide security in the IoT [2]. Resource-constrained applications comprising of sensor nodes in wireless sensor networks, RFID tags require smaller footprint with minimum battery consumption.…”
Section: Introductionmentioning
confidence: 99%