2019 International Engineering Conference (IEC) 2019
DOI: 10.1109/iec47844.2019.8950634
|View full text |Cite
|
Sign up to set email alerts
|

A New Six-Dimensional Hyper-Chaotic System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…The Table (7) presents a comparison of a proposed algorithm with six algorithms from literature based on two performance metrics: NPCR and UACI. The proposed algorithm achieved an NPCR value of 99.6002, which is slightly lower than Algorithm [1] (99.9353), but higher than Algorithms [2][3][4][5][6] (ranging from 99.65 to 99.617). The proposed algorithm also achieved a higher UACI value of 35.3623, as compared to all six previous algorithms (ranging from 33.38 to 33.64).…”
Section: Proposed System and Another System Comparisonmentioning
confidence: 71%
See 1 more Smart Citation
“…The Table (7) presents a comparison of a proposed algorithm with six algorithms from literature based on two performance metrics: NPCR and UACI. The proposed algorithm achieved an NPCR value of 99.6002, which is slightly lower than Algorithm [1] (99.9353), but higher than Algorithms [2][3][4][5][6] (ranging from 99.65 to 99.617). The proposed algorithm also achieved a higher UACI value of 35.3623, as compared to all six previous algorithms (ranging from 33.38 to 33.64).…”
Section: Proposed System and Another System Comparisonmentioning
confidence: 71%
“…Traditional standard methods are typically designed for textual information, which is not suitable for encrypting digital image information. Therefore, it is very important to find a more secure and effective image encryption scheme for information security [3]. Chaos-based cryptography, since its inception, has become a widely published Subject.…”
Section: Introductionmentioning
confidence: 99%
“…Chaos, is sometimes known as the "butterfly effect [16].Is a phenomenon that results from the complex, aperiodic behavior of deterministic systems that exhibits remarkable sensitivity to minute changes in initial conditions [15].In the framework of Shannon's confusion and diffusion principles, this characteristic of chaos has been used in cryptography [13]. Chaotic events have demonstrated potential as a source of pseudo randomness in information security by utilizing their mixing property and great sensitivity to tiny fluctuations [2], [13], [17].…”
Section: Research Methods: a Chaotic Systemmentioning
confidence: 99%
“…As a result, numerous approaches and procedures have been created in an attempt to identify the fastest and most secure method for encrypting digital image content [1] [2]. Image encryption presents a number of challenges, including encryption quality, processing time, 88 and difficulties associated with the encryption key (such as key space and key exchange in the case of symmetric key) [3][4][5]. A more robust encryption technique is indicated by a higher level of noise and a more unintelligible encrypted image.…”
Section: Introductionmentioning
confidence: 99%