2022
DOI: 10.1088/1402-4896/ac7c43
|View full text |Cite
|
Sign up to set email alerts
|

A novel hyperchaotic map and its application in fast video encryption

Abstract: By the combined feedback of exponential, cubic and sinusoidal nonlinearity, a hyperchaotic map is constructed, which has the distinct features as providing two unipolar hyperchaotic sequences and large area of hyperchaotic orbit. A fast video encryption algorithm that adopted the permutation-diffusion-permutation strategy was developed consequently based on the hyperchaotic system. Each frame image obtained from the video stream is encrypted by the algorithm in real time. To accelerate the encryption, the fram… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 44 publications
0
2
0
Order By: Relevance
“…Over decades, chaos has been widely used in the field of rapid mixing of liquids [2,3], pseudo-random number generators [4,5], digital image encryption [6][7][8][9][10][11], spread spectrum communication [12], and secure communication [13,14]. The rapid development of these valuable applications is driven by creating new chaotic systems, which offer novel dynamic behaviors [15][16][17]. Encryption is one of the most widespread applications of chaotic systems [18][19][20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%
“…Over decades, chaos has been widely used in the field of rapid mixing of liquids [2,3], pseudo-random number generators [4,5], digital image encryption [6][7][8][9][10][11], spread spectrum communication [12], and secure communication [13,14]. The rapid development of these valuable applications is driven by creating new chaotic systems, which offer novel dynamic behaviors [15][16][17]. Encryption is one of the most widespread applications of chaotic systems [18][19][20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%
“…In the digital age, the protection of sensitive information in the ubiquitous digital images is paramount, given their use in a wide range of personal, commercial, and medical applications and the private information contained in them is susceptible to theft by unauthorized parties [1][2][3]. Image encryption, particularly those using chaotic theory, has emerged as a robust solution to secure these images during transmission and storage [4][5][6].…”
Section: Introductionmentioning
confidence: 99%