2016
DOI: 10.1002/sec.1458
|View full text |Cite
|
Sign up to set email alerts
|

A secure image encryption algorithm based on chaotic maps and SHA‐3

Abstract: In this paper, a chaotic image encryption algorithm is suggested combining with double chaotic maps, SHA‐3 (Secure Hash Algorithm‐3), and auto‐updating system. To shuffle pixel positions, a matrix having same size of the plain‐image is generated dependent on the plain‐image in stage of permutation. Then, SHA‐3 is taken to calculate its hash values used to produce control parameter and initial condition of Logistic map. After that, total permutation is implemented for row and column to exchange pixels, where au… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(20 citation statements)
references
References 24 publications
0
20
0
Order By: Relevance
“…Among them, chaos-based image encryption method is receiving more and more interests, for chaotic system has many excellent features, for example, sensitive dependence on initial conditions, pseudo-randomness, ergodicity and reproduction. Therefore, many image encryption algorithms based on chaotic systems have been put forward in recent years [7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…Among them, chaos-based image encryption method is receiving more and more interests, for chaotic system has many excellent features, for example, sensitive dependence on initial conditions, pseudo-randomness, ergodicity and reproduction. Therefore, many image encryption algorithms based on chaotic systems have been put forward in recent years [7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%
“…Logistic map [25][26][27] is one of the important and practical chaotic motions and has been widely used in data encryption [28][29][30][31][32]. The equation of the logistic map is shown as…”
Section: Preliminaries Chaos Theorymentioning
confidence: 99%
“…Nowadays, different techniques have been used to design image encryption schemes . In , an image encryption scheme using chaotic logistic map is proposed.…”
Section: Related Workmentioning
confidence: 99%
“…Chaos‐based image shuffling and diffusion process using DNA is discussed in . An image encryption scheme based on chaotic maps and SHA‐3 is designed in .Von Neumann proposed a new emerging concept called CA . CA is a discrete model consisting of regular grid of cells, each in one of the finite number of states.…”
Section: Related Workmentioning
confidence: 99%