2016
DOI: 10.1007/s11042-016-3585-x
|View full text |Cite
|
Sign up to set email alerts
|

A new chaos-based image encryption algorithm with dynamic key selection mechanisms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
39
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 87 publications
(40 citation statements)
references
References 40 publications
1
39
0
Order By: Relevance
“…It can be discovered that the histogram variance values of the encrypted images are much smaller than those of the original images. Moreover, Table 11 displays the comparison of the mean histogram variance values of the [26,[36][37][38]. Obviously, the histogram variance values of our scheme are smaller, that is, the histograms of the ciphered images have better uniformity.…”
Section: Mathematical Problems In Engineeringmentioning
confidence: 99%
See 1 more Smart Citation
“…It can be discovered that the histogram variance values of the encrypted images are much smaller than those of the original images. Moreover, Table 11 displays the comparison of the mean histogram variance values of the [26,[36][37][38]. Obviously, the histogram variance values of our scheme are smaller, that is, the histograms of the ciphered images have better uniformity.…”
Section: Mathematical Problems In Engineeringmentioning
confidence: 99%
“…[37] 1077.3 Ref. [38] 1209.4 decrypted images. is shows that the proposed scheme can effectively resist cropping attack.…”
Section: Cropping Attack Analysismentioning
confidence: 99%
“…TEA (Tiny Encryption Algorithm) is a simple and efficient encryption algorithm, known for its fast encryption and decryption and simple implementation. The TEA algorithm is very simple [8]. It can operate 64-bit data at a time and use 128-bit data as a key.…”
Section: The Software Design Of Front-end Devicementioning
confidence: 99%
“…al. [8] "A new chaos-based image encryption algorithm with dynamic key selection mechanisms" In recent years, a wide reasonably cryptographically algorithms supported chaos has been suggests and most of them are proved to realize success by adopting the standard permutation-diffusion style. However, one disadvantage these methods principally hold is that they have little reference to the plaintext or, properly speaking, the connection between them is kind of less.…”
Section: Literature Surveymentioning
confidence: 99%
“…The dimension of the generated transparencies is identical to the secret image. Yang [8] furthermore planned a probabilistic model of VC scheme and also the 2 cases and is clearly made to achieve the optimum contrast. Based on principle, Cimatoe planned a generalized VC theme within which the pixel expansion is between the probabilistic model of VC theme and also the traditional VC theme.…”
Section: Introductionmentioning
confidence: 99%