2021
DOI: 10.1007/s11042-021-11696-0
|View full text |Cite
|
Sign up to set email alerts
|

A secure image encryption scheme based on three different chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…All of these have put forward higher requirements for data security on the Internet [6,7]. Due to the openness of the Internet itself, every user who surfs the Internet becomes both a bene ciary of the network and a destroyer of the network [8]. Also due to the disorder of the current Internet network, the network order is basically in an unreliable state.…”
Section: Introductionmentioning
confidence: 99%
“…All of these have put forward higher requirements for data security on the Internet [6,7]. Due to the openness of the Internet itself, every user who surfs the Internet becomes both a bene ciary of the network and a destroyer of the network [8]. Also due to the disorder of the current Internet network, the network order is basically in an unreliable state.…”
Section: Introductionmentioning
confidence: 99%
“…However, the model does not consider the security while encrypting real time images. De et al [27] developed three different chaotic maps for the process of secure image encryption. The image encryption distinctly captured the required position for providing multimedia data security.…”
Section: Introductionmentioning
confidence: 99%
“…The authors of Reference 22 proposed a technique based on three different chaotic maps. BFL map, logistic map, and Chebyshev maps are used to generate multiple keys recursively, which are then combined to form a single key.…”
Section: Introductionmentioning
confidence: 99%