2015
DOI: 10.1016/j.sigpro.2014.10.033
|View full text |Cite
|
Sign up to set email alerts
|

A RGB image encryption algorithm based on total plain image characteristics and chaos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

3
147
1
4

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 279 publications
(155 citation statements)
references
References 35 publications
3
147
1
4
Order By: Relevance
“…By comparison, we conclude that the proposed encryption algorithm is slower than Refs. [24,34], but quicker than Refs. [23,35].…”
Section: Encryption Efficiency Analysismentioning
confidence: 82%
See 1 more Smart Citation
“…By comparison, we conclude that the proposed encryption algorithm is slower than Refs. [24,34], but quicker than Refs. [23,35].…”
Section: Encryption Efficiency Analysismentioning
confidence: 82%
“…[23,35]. The algorithm proposed by Murillo et al [24] is for real-time application. As a result, the encryption time is shorter and the encryption speed is faster and the algorithm of Ref.…”
Section: Encryption Efficiency Analysismentioning
confidence: 99%
“…In recent years, chaotic systems have attracted the attention of the scientific community due to their potential applications in several areas of science and engineering, as an interesting nonlinear phenomenon with different applications in biology, secure communication, complex networks, experimental network synchronization, fingerprint encryption, among others [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15]. In 1963, Lorenz proposed a three-dimensional system of two scrolls; this is recognized as the first reported chaotic model [16].…”
Section: Introductionmentioning
confidence: 99%
“…The novelty of the proposed chaotic system is the combination of different characteristics that it presents: two critical parameters, only two nonlinearities, low complexity time, low iterations per second, and a larger step size for the discretized version where chaos is preserved, low-cost electronic implementation; also it is flexible and robust with respect to some recent attractors reported in the literature; see, for example, [22,23]. As a consequence, all these features result in a high ease of implementation that may be of great interest in engineering applications, for example, in cryptography, biometric 2 Complexity systems, telemedicine, and secure communications; see, for example, [10,12,13,37]. To the best of our knowledge the electronical implementation in a portable TFTTSD device of DV of chaotic systems, for the reproduction of their nonlinear dynamics in real-time, is new.…”
Section: Introductionmentioning
confidence: 99%
“…Instructive guidelines for developing chaos-based cryptosystems were published by Alvarez and Li [2006]. The logistic map has often been applied to chaosbased stream ciphers [Murillo-Escobar et al, 2015;Munir, 2012;Wang et al, 2012]. Interesting results on the cryptanalysis of a chaotic cipher based on the logistic map was published by Li et al [2014].…”
Section: Introductionmentioning
confidence: 99%