2007
DOI: 10.1016/j.chaos.2005.11.090
|View full text |Cite
|
Sign up to set email alerts
|

A fast image encryption system based on chaotic maps with finite precision representation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
170
0
1

Year Published

2008
2008
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 389 publications
(171 citation statements)
references
References 15 publications
0
170
0
1
Order By: Relevance
“…The unified average changing intensity (UACI) measures the average intensity of differences between the plain image and ciphered image [2,9]. The NPCR and UACI of these two images are defined in equations 6-8.…”
Section: Npcr and Uaci Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The unified average changing intensity (UACI) measures the average intensity of differences between the plain image and ciphered image [2,9]. The NPCR and UACI of these two images are defined in equations 6-8.…”
Section: Npcr and Uaci Analysismentioning
confidence: 99%
“…Many image encryption methods have been proposed in the literature based on different principles. Chaos-based encryption techniques have been preferred compared to other methods, because they provide a good combination of speed and high security [2].…”
Section: Introductionmentioning
confidence: 99%
“…This can be shown when very large amount of change is taking place in the generated Fractal image when a very small amount of change is occurred in any one of the main parameters that are used for fractal image generation. Therefore, according to these robust specifications, the fractal image nowadays is used as a secure and effective encryption key [16].…”
Section: The Use Of Fractal As a Key In Encryptionmentioning
confidence: 99%
“…For statistical analysis, we evaluated histogram, correlation, and entropy. To analyze sensitivity, the performances of NPCR and UACI were estimated using (11) and (13). Subsequently, we compared the results with those of Wang's algorithm and Yang's algorithm.…”
Section: Security Analysismentioning
confidence: 99%
“…Unfortunately, these algorithms are vulnerable to chosen-plaintext attacks [1,23]. Consequently, many other encryption schemes that are not susceptible to this type of attack have been proposed [3,5,12,13,21].…”
Section: Introductionmentioning
confidence: 99%