2022
DOI: 10.1007/s11042-022-12139-0
|View full text |Cite
|
Sign up to set email alerts
|

A novel design of multiple image encryption using perturbed chaotic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(5 citation statements)
references
References 91 publications
0
5
0
Order By: Relevance
“…Liu et al [7] offers color image encryption based on the construction of a coupled chaotic map. Hoang [8] proposed a crypto system based on a multitude of chaotic maps that define an effective result. All these approaches use a Lyapunov exponent calculation [9] to check the installation of chaos and sensitivity to initial conditions.…”
Section: Related Workmentioning
confidence: 99%
“…Liu et al [7] offers color image encryption based on the construction of a coupled chaotic map. Hoang [8] proposed a crypto system based on a multitude of chaotic maps that define an effective result. All these approaches use a Lyapunov exponent calculation [9] to check the installation of chaos and sensitivity to initial conditions.…”
Section: Related Workmentioning
confidence: 99%
“…Tsafack et al [31] proposed a new two-dimensional trigonometric logistics-sine-cosine mapping, which first generates three sets of key streams from the map and calculates the Hamming distance in combination with the image R, G and B components, and finally XOR the output distance vector with the key stream to realize the encryption of the image, which greatly improves the security of the cryptosystem. Fei et al [32] proposed an image encryption algorithm for jump diffusion based on a two-dimensional absolute sine-cosine coupling chaotic system (2D-ASCC) with higher complexity and better pseudo-randomness, which effectively improves the security performance of the encryption algorithm. Hoang et al [33] proposed a chaos-based multi-image encryption algorithm, which adopts the permutation diffusion architecture for the first time and constructs the disturbance amount according to the pixel coordinates and the original image content, respectively, in the process of pixel arrangement and diffusion, so that the encryption algorithm has good resistance to differential attacks.…”
Section: Related Workmentioning
confidence: 99%
“…With the increasing amount of information on the network, researchers are focusing on multiple image encryption (MIE) algorithms [29][30][31][32]. Single image encryption algorithm cannot hide information into other images, which may lead to low security and efficiency [33,34].…”
Section: Introductionmentioning
confidence: 99%