2014
DOI: 10.1007/s11071-014-1259-7
|View full text |Cite
|
Sign up to set email alerts
|

A new image alternate encryption algorithm based on chaotic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
57
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 118 publications
(57 citation statements)
references
References 19 publications
0
57
0
Order By: Relevance
“…That is, the result is optimal in this paper compared with Ref. [9][10]. The lesser the correlation of two adjacent pixels, the safer the algorithm.…”
Section: Correlation Of Adjacent Pixelsmentioning
confidence: 77%
See 1 more Smart Citation
“…That is, the result is optimal in this paper compared with Ref. [9][10]. The lesser the correlation of two adjacent pixels, the safer the algorithm.…”
Section: Correlation Of Adjacent Pixelsmentioning
confidence: 77%
“…Because chaotic systems/maps have some intrinsic properties, such as ergodicity, sensitive to the initial condition and control parameters, which are analogous to the confusion and diffusion properties specified by Shannon [1]. Thus makes it natural to employ chaotic systems in image encryption algorithms [2][3][4][5][6][7][8][9][10][11]. Therefore, many chaotic image encryption algorithms have been developed by directly utilizing existing chaotic systems/maps [8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%
“…As mentioned in Section 4 of [1], x(0) = avg 2 , and thus, it depends on sum(P), which in turn depends on the plaintext P, as per Equations (2) and (3). In the chosen plaintext attack scenario [20] considered by Wang and Guo, the attacker is given the ability to request the encrypted image C for any chosen plain image P of the attacker's choice.…”
Section: Encryptmentioning
confidence: 99%
“…Very recently, Wang and Guo [1] proposed a new image alternate encryption scheme based on chaotic map. Technically, they proposed the use of keydependent chaotic sequence to provide confusion and diffusion, the two important cryptographic properties for the design of a secure block cipher.…”
Section: Introductionmentioning
confidence: 99%
“…Over the last few years, many image encryption algorithms based on chaotic maps have been presented [8][9][10].…”
mentioning
confidence: 99%