2015
DOI: 10.1016/j.cnsns.2014.06.032
|View full text |Cite
|
Sign up to set email alerts
|

A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
76
0
1

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 142 publications
(80 citation statements)
references
References 37 publications
3
76
0
1
Order By: Relevance
“…At this point, we have Arr""= [6,1,2,5,4,3,0,7]. The final bit permuted pixel P P BP by shuffling bits to positions of P P BS as indicated by Arr"".…”
Section: Pixel Bit Permutation Operationmentioning
confidence: 99%
See 1 more Smart Citation
“…At this point, we have Arr""= [6,1,2,5,4,3,0,7]. The final bit permuted pixel P P BP by shuffling bits to positions of P P BS as indicated by Arr"".…”
Section: Pixel Bit Permutation Operationmentioning
confidence: 99%
“…Since 1990, chaotic systems have gained a lot of interest in the field of cryptography due to their desirable properties such as high sensitivity to initial conditions, ergodicity and pseudo randomness. Chaotic systems have also demonstrated great potential for information security especially image encryption [1,6,10,12,14,20,22].…”
Section: Introductionmentioning
confidence: 99%
“…In the cryptosystem, the secret key parameters are 0 , , , x s p q and n . According to the IEEE (Institute of Electrical and Electronics Engineers) floating-point standard [2], the computational precision of the 64-bit double precision number is about …”
Section: Key Space Analysismentioning
confidence: 99%
“…Chaotic systems have important properties of sensitivity to initial conditions and control parameters, pseudo-randomness and ergodicity [2] [8] [9], which meet Shannon's requirements of confusion and diffusion in cryptography [10]. These characteristics make the chaotic systems a good candidate for data encryption and create the phenomena of chaos-based cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…The Visual image encryption methods can be applied to image encryption [12]. since, 1990s, chaotic frameworks have been drawn much importance as their fundamental characteristics such as ergodicity, randomness, and sensitivity [13]. Both have sensitive, randomness, confusion and diffusion.Cryptographic methods and chaotic maps have some similar characteristics show in table 1.…”
Section: Introductionmentioning
confidence: 99%