2012
DOI: 10.1016/j.sigpro.2011.10.023
|View full text |Cite
|
Sign up to set email alerts
|

A novel colour image encryption algorithm based on chaos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
308
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 671 publications
(318 citation statements)
references
References 13 publications
1
308
0
Order By: Relevance
“…While doing so, such class of algorithms conveniently neglect the correlations of the R, G and B components together. Most of the papers discussed here [1] [ [2][3][4][5][6][7][8][9][10][11][12][13][14][15] are not an extension of the gray scale image encryption scheme, with the exception of [2]. The comparison criteria of most of the papers [1][2][3][4][5][6][7][8][9] are based on the following: 1) Number of Pixel Change Rate (NPCR)-This depicts that the more a particular cryptosystem is sensitive to changing of the original inputted data, the more effective that cryptosystem is to resist a statistical attack from an intruder.…”
Section: Evaluation and Comparison Criteria Of Image Encryptionmentioning
confidence: 99%
“…While doing so, such class of algorithms conveniently neglect the correlations of the R, G and B components together. Most of the papers discussed here [1] [ [2][3][4][5][6][7][8][9][10][11][12][13][14][15] are not an extension of the gray scale image encryption scheme, with the exception of [2]. The comparison criteria of most of the papers [1][2][3][4][5][6][7][8][9] are based on the following: 1) Number of Pixel Change Rate (NPCR)-This depicts that the more a particular cryptosystem is sensitive to changing of the original inputted data, the more effective that cryptosystem is to resist a statistical attack from an intruder.…”
Section: Evaluation and Comparison Criteria Of Image Encryptionmentioning
confidence: 99%
“…[4][5][6][7]. all of image encryption schemes can be essentially categorized into three different types which are: pixels value conversion, permutation of pixel position and finally integration of them [8].…”
Section: Introductionmentioning
confidence: 99%
“…[8,9] Commonly, the chaotic system have fast with minimal costs, making it better than most traditional methods which are used to encrypt digital images [6]. In the subsequent paragraphs, will provide a brief explanation of some significant improvements that have been occurs on image encryption methods using chaotic system.…”
Section: Introductionmentioning
confidence: 99%
“…The common drawback of these algorithms is: they neglect the correlations between the components R, G, B and are more vulnerable to attack [9][10][11][12][13][14][15]. To overcome this problem, a novel color image encryption algorithm based on 1-D chaos map is described for the encryption R, G and B components of color image at the same time and made the three components affect each other [16].…”
Section: Introductionmentioning
confidence: 99%
“…The common drawback of these algorithms is: they neglect the correlations between the components R, G, B and are more vulnerable to attack [9][10][11][12][13][14][15]. To overcome this problem, a novel color image encryption algorithm based on 1-D chaos map is described for the encryption R, G and B components of color image at the same time and made the three components affect each other [16].In this paper, a new chaotic map which combines the logistic map and cubic map is used as a 1-D chaotic system to shuffle the position of blocks of the three components of image, on the other side the 2-D logistic map is used to rearrange the position of image pixels. These two chaotic systems are used to encrypt R, G, and B components of color image at the same time and made the three components affect each other.…”
mentioning
confidence: 99%