2019
DOI: 10.1016/j.optlastec.2018.08.040
|View full text |Cite
|
Sign up to set email alerts
|

A novel robust compression-encryption of images based on SPIHT coding and fractional-order discrete-time chaotic system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
13
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 33 publications
(14 citation statements)
references
References 57 publications
0
13
0
Order By: Relevance
“…As shown in Table 1 , some previous chaos-based ciphers are vulnerable upon various attack methods, including chosen-ciphertext attack [ 16 ], chosen-/known-plaintext attack [ 12 ], differential cryptanalysis [ 17 ], even cipher-only attack [ 18 ]. Therefore, research on security is extremely important and has received much attention [ 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 ].…”
Section: Introductionmentioning
confidence: 99%
“…As shown in Table 1 , some previous chaos-based ciphers are vulnerable upon various attack methods, including chosen-ciphertext attack [ 16 ], chosen-/known-plaintext attack [ 12 ], differential cryptanalysis [ 17 ], even cipher-only attack [ 18 ]. Therefore, research on security is extremely important and has received much attention [ 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 , 33 ].…”
Section: Introductionmentioning
confidence: 99%
“…Because of its rich dynamic characteristics and potential application value, the research on its dynamic characteristics and application has attracted extensive attention [11][12][13]. It has been known that fractional-order chaotic system has been used in image encryption [14,15], sound encryption [16], image compression-encryption technique [17][18][19], and secure communication [20][21][22].…”
Section: Introductionmentioning
confidence: 99%
“…Generalized chaotic maps are used to design pseudo-random number key generator. In [58], the authors proposed an image compression-encryption scheme based on set partitioning in hierarchical trees coding-decoding algorithm and synchro-nization of chaotic maps with non-integer order. Although the image encryption algorithm based on the chaotic system develops rapidly, not all algorithms based on this principle are secure.…”
Section: Introductionmentioning
confidence: 99%