2009
DOI: 10.1016/j.cnsns.2008.11.005
|View full text |Cite
|
Sign up to set email alerts
|

A new substitution–diffusion based image cipher using chaotic standard and logistic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
146
0
1

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 299 publications
(147 citation statements)
references
References 32 publications
0
146
0
1
Order By: Relevance
“…So, a remarkable number of chaotic systems, both physical and mathematical, were designed for realizing encryption and decryption of messages in both hardware and software equipments (Patidar, Pareek & Sud, 2009) (Etemadi Borujeni & Eshghi, 2009 (XiaoJun & MingGen, 2010).…”
Section: Introductionmentioning
confidence: 99%
“…So, a remarkable number of chaotic systems, both physical and mathematical, were designed for realizing encryption and decryption of messages in both hardware and software equipments (Patidar, Pareek & Sud, 2009) (Etemadi Borujeni & Eshghi, 2009 (XiaoJun & MingGen, 2010).…”
Section: Introductionmentioning
confidence: 99%
“…Key space size is the total number of different keys that can be used in the cryptosystem (Patidar et al, 2009;Behnia et al, 2008). Cryptosystem should be completely sensitive to all secret keys (i.e.…”
Section: Key Space Analysismentioning
confidence: 99%
“…The logistic map is one dimensional chaotic system with X output and input variable and two initial conditions X0 and α (Patidar et al, 2009;Yong et al,2008;Behnia et al, 2007), the basic form of the one dimensional logistic map is:…”
Section: Logistic Mapmentioning
confidence: 99%
“…Some encryption algorithms such as DES, AES, RSA, and others have been widely used to encrypt the image data, but these algorithms still must be improved durability of various attacks, such as brute force attacks [1]. Many research have been done in how to improve the durability of the algorithms used in the encryption process from a brute force attack, provide a good combination of speed, high security, complexity, and computational power, etc [2], [3]. One of them is using the chaos theory.…”
Section: Introductionmentioning
confidence: 99%