2010 International Conference on Artificial Intelligence and Computational Intelligence 2010
DOI: 10.1109/aici.2010.198
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Image Encryption Scheme Using Pixel Shuffler and A5/1

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…However, compared to text, much more processing power and bandwidth for processing is required. In recent years a number of different image encryption schemes have been proposed in order to overcome image encryption problems (Lv, Zhang, & Guo, 2009) (Akhshani et al, 2010) (Jolfaei & Mirghadri, 2010a). Due to desirable properties of non-linear dynamical systems such as pseudo-random behavior, sensitivity to initial conditions and ergodicity, the chaos-based encryption has suggested a new and efficient way to deal with the intractable problem of fast and highly secure image encryption.…”
Section: Introductionmentioning
confidence: 99%
“…However, compared to text, much more processing power and bandwidth for processing is required. In recent years a number of different image encryption schemes have been proposed in order to overcome image encryption problems (Lv, Zhang, & Guo, 2009) (Akhshani et al, 2010) (Jolfaei & Mirghadri, 2010a). Due to desirable properties of non-linear dynamical systems such as pseudo-random behavior, sensitivity to initial conditions and ergodicity, the chaos-based encryption has suggested a new and efficient way to deal with the intractable problem of fast and highly secure image encryption.…”
Section: Introductionmentioning
confidence: 99%
“…17, the Henon map [36] by using Eq. 18, Baker's map [37] in accordance with Eq. (19), the prime modulus multiplicative linear congruential generator (PMMLCG) [38] by using Eq.…”
Section: A Chaotic Map Keyspace Comparisonmentioning
confidence: 96%
“…It is expected that the histogram of the encrypted image is uniformly distributed. In this case, it becomes difficult to divide the content of the original image [30]. This coefficient gives us a quantitative indication of the similarity between the original image and the encrypted one [31].…”
Section: Histogrammentioning
confidence: 99%