2013
DOI: 10.1007/s11042-013-1699-y
|View full text |Cite
|
Sign up to set email alerts
|

A novel image encryption based on row-column, masking and main diffusion processes with hyper chaos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 111 publications
(23 citation statements)
references
References 43 publications
0
23
0
Order By: Relevance
“…Over the last decade, a variety of chaotic systems have been developed [9,10] for the construction of image cryptosystems, including and not limited to the 3D baker map [11], the 2D logistic map [12], the 3D cat map [13], the 2D standard map [14], the 3D LCA map [15], and the 2D henon map [16]. Moreover, some chaotic systems have been combined with other approaches for this purpose, such as DNA computing [17,18], one-time keys [19], cellular automata [20], and the perceptron model [21], which have been used for the specific objective of enhancing image cryptosystem security.…”
mentioning
confidence: 99%
“…Over the last decade, a variety of chaotic systems have been developed [9,10] for the construction of image cryptosystems, including and not limited to the 3D baker map [11], the 2D logistic map [12], the 3D cat map [13], the 2D standard map [14], the 3D LCA map [15], and the 2D henon map [16]. Moreover, some chaotic systems have been combined with other approaches for this purpose, such as DNA computing [17,18], one-time keys [19], cellular automata [20], and the perceptron model [21], which have been used for the specific objective of enhancing image cryptosystem security.…”
mentioning
confidence: 99%
“…High values is suitable for this evaluation parameter, because it indicates that the average difference between two encrypted images is large and the cryptographic method is resistant to differential attacks [40].…”
Section: Unified Average Changing Intensity (Uaci)mentioning
confidence: 99%
“…The key space of an image encryption scheme, which can resist brute-force attacks, should be more than 100 2 in [59]. In this paper the secret keys of the proposed encryption algorithm mainly include:…”
Section: E Key Space Analysismentioning
confidence: 99%