2021
DOI: 10.1007/s00530-021-00772-y
|View full text |Cite
|
Sign up to set email alerts
|

A novel multi-image cryptosystem based on weighted plain images and using combined chaotic maps

Abstract: This paper introduces a new multi-image cryptosystem based on modified Henon map and nonlinear combination of chaotic seed maps. Based on the degree of correlation between the adjacent pixels of the plain image, a unique weight is assigned to the plain image. First, the coordinates of plain images are disrupted by modified Henon map as confusion phase. In the first step of diffusion phase, the pixels content of images are changed separately by XOR operation between confused images and matrices with suitable no… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 77 publications
0
6
0
Order By: Relevance
“…Encryption algorithms with a large enough key space can well resist various violent attacks such as exhaustive attacks [2]. An effective encryption scheme should have a key space more than 2 100 to resist brute force attacks [11,43]. In this study, the secret keys are a, b, c, d, e, f, r in proposed RNS, 𝑢 0 in the Sine map; 𝑣 0 in the Logistic map; g, h, and k (number of iteration) in the ACM.…”
Section: Key Space Analysismentioning
confidence: 99%
See 4 more Smart Citations
“…Encryption algorithms with a large enough key space can well resist various violent attacks such as exhaustive attacks [2]. An effective encryption scheme should have a key space more than 2 100 to resist brute force attacks [11,43]. In this study, the secret keys are a, b, c, d, e, f, r in proposed RNS, 𝑢 0 in the Sine map; 𝑣 0 in the Logistic map; g, h, and k (number of iteration) in the ACM.…”
Section: Key Space Analysismentioning
confidence: 99%
“…First, a very small change (in the range of 10 -14 ) in the secret key generates completely different encrypted image. Second, the decryption process with an incorrect key, which is slightly different (in the range of 10 -14 ) from the correct key, does not reconstruct the original image [11]. The key sensitivity simulation results are shown in Fig.…”
Section: Key Sensitivitymentioning
confidence: 99%
See 3 more Smart Citations