2015
DOI: 10.1007/s11042-015-3064-9
|View full text |Cite
|
Sign up to set email alerts
|

A novel encryption scheme for colored image based on high level chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
34
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 88 publications
(38 citation statements)
references
References 24 publications
0
34
0
Order By: Relevance
“…Assume n is an integer and x ∈ [−1, 1]. The Chebyshev polynomial T n ( x ) : [−1, 1] → [−1, 1] is defined as (1), and the recurrence relation of T n ( x ) is defined as (2) Tn()x=cos()n0.25emitalicarccos()x8.25em Tn()x=2xTn1()xTn2()x;n2,T0()x=1,T1()x=x1.5em One of the most important properties of the Chebyshev polynomials is the semigroup property (3).…”
Section: Preliminaries and Threat Modelmentioning
confidence: 99%
“…Assume n is an integer and x ∈ [−1, 1]. The Chebyshev polynomial T n ( x ) : [−1, 1] → [−1, 1] is defined as (1), and the recurrence relation of T n ( x ) is defined as (2) Tn()x=cos()n0.25emitalicarccos()x8.25em Tn()x=2xTn1()xTn2()x;n2,T0()x=1,T1()x=x1.5em One of the most important properties of the Chebyshev polynomials is the semigroup property (3).…”
Section: Preliminaries and Threat Modelmentioning
confidence: 99%
“…More recently, in order to resist the powerful chosen-plaintext and chosen-ciphertext attacks, a plaintext related image encryption scheme was proposed [ 12 , 23 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 ]. For some algorithms, the previous encrypted pixel is used to encrypt the current pixel, and after several rounds of processing in the diffusion stage of some algorithms, so the information of one pixel in the plain-image can be spread into the entire cipher image [ 23 , 35 , 36 ].…”
Section: Introductionmentioning
confidence: 99%
“…However, and for the S-box generation algorithm and for the bit exclusive OR (XOR) are obtained only from the fixed keys. A plain-image-based keystream generation was proposed in [34], in which pixel summation , , for the pixels were computed to affect the secret keys. However, if we modify two pixels with same summation for the plain-image, then the keystream will also be the same.…”
Section: Introductionmentioning
confidence: 99%