2014
DOI: 10.5626/jcse.2014.8.4.187
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach for Image Encryption Based on Cyclic Rotations and Multiple Blockwise Diffusions Using Pomeau-Manneville and Sin Maps

Abstract: In this paper an efficient image encryption scheme based on cyclic rotations and multiple blockwise diffusions with two chaotic maps is proposed. A Sin map is used to generate round keys for the encryption/decryption process. A Pomeau-Manneville map is used to generate chaotic values for permutation, pixel value rotation and diffusion operations. The encryption scheme is composed of three stages: permutation, pixel value rotation and diffusion. The permutation stage performs four operations on the image: row s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…Permutation plays an important role in the development of cryptographic algorithms and it contains the finite set of numbers or symbols that are used to mix up a readable message into ciphertext as shown in transposition cipher [10]. The logic behind any cryptographic algorithm is the number of possible combinations in the key space, and bigger key-space could be achieved from the used of flips and twists of the elements of the cube which ensure every state of the cube is actually permuted [11], [12]. An image permutation algorithm based on the geometrical projection and shuffling in the design of key schedule algorithm is used to increases the security of original image by preventing it from outside attacks [13], [14].…”
Section: Introductionmentioning
confidence: 99%
“…Permutation plays an important role in the development of cryptographic algorithms and it contains the finite set of numbers or symbols that are used to mix up a readable message into ciphertext as shown in transposition cipher [10]. The logic behind any cryptographic algorithm is the number of possible combinations in the key space, and bigger key-space could be achieved from the used of flips and twists of the elements of the cube which ensure every state of the cube is actually permuted [11], [12]. An image permutation algorithm based on the geometrical projection and shuffling in the design of key schedule algorithm is used to increases the security of original image by preventing it from outside attacks [13], [14].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, several chaos-based articles have been proffered [4][5]. Unfortunately, the one-dimensional logistic map has been widely used in several cryptosystems based on chaos [6][7]. Nev-ertheless, this map has some disadvantages when it is used in cryptography such as not uniform distribution, small space key, chaotic discontinuous ranges, and periodicity in chaotic ranges [8].…”
Section: Introductionmentioning
confidence: 99%