2020
DOI: 10.3390/e22070779
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Image-Encryption Scheme Based on a Non-Linear Cross-Coupled Hyperchaotic System with the Dynamic Correlation of Plaintext Pixels

Abstract: Based on a logistic map and Feigenbaum map, we proposed a logistic Feigenbaum non-linear cross-coupled hyperchaotic map (LF-NCHM) model. Experimental verification showed that the system is a hyperchaotic system. Compared with the existing cross-coupled mapping, LF-NCHM demonstrated a wider hyperchaotic range, better ergodicity and richer dynamic behavior. A hyperchaotic sequence with the same number of image pixels was generated by LF-NCHM, and a novel image-encryption algorithm with permutation that is dynami… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 40 publications
0
9
0
Order By: Relevance
“…Moreover, Table 4 displays the results of the number of pixel change rate (NPCR) and unified average changing intensity (UACI) values in this paper and other references. It is evident to see that from the comparison result, the NPCR results performs better than [20,34,37,38], and inferior to [1,33], but for the UACI results, the value in our algorithm is closer to the theoretical value than for any other algorithms. Considering all these three implications, the algorithm proposed here performs well in resisting the differential attacks.…”
Section: Differential Attackmentioning
confidence: 65%
See 4 more Smart Citations
“…Moreover, Table 4 displays the results of the number of pixel change rate (NPCR) and unified average changing intensity (UACI) values in this paper and other references. It is evident to see that from the comparison result, the NPCR results performs better than [20,34,37,38], and inferior to [1,33], but for the UACI results, the value in our algorithm is closer to the theoretical value than for any other algorithms. Considering all these three implications, the algorithm proposed here performs well in resisting the differential attacks.…”
Section: Differential Attackmentioning
confidence: 65%
“…From the table we can see that the algorithm we proposed performs with better time efficiency and consumes fewer machine cycles. Compared with the block-based scheme in [38], our scheme improved the security with the exchange of the speed, while the time efficiency is enhanced from the comparison with the pixel-level algorithm in [33] and the bit-level algorithms in [21,37]. Considering the results from the comparison, our algorithm performed excellently in both time efficiency and security aspects.…”
Section: Time Efficiency Of the Encryption Schemementioning
confidence: 90%
See 3 more Smart Citations