2018
DOI: 10.3390/e20070535
|View full text |Cite
|
Sign up to set email alerts
|

A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion

Abstract: Abstract:Recently, to conquer most non-plain related chaos-based image cryptosystems' security flaws that cannot resist the powerful chosen/knownn plain-text attacks or differential attacks efficiently for less plaintext sensitivity, many plain related chaos-based image cryptosystems have been developed. Most cryptosystems that have adopted the traditional permutation-diffusion structure still have some drawbacks and security flaws: (1) most plaintext related image encryption schemes using only plaintext relat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
54
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(54 citation statements)
references
References 43 publications
(140 reference statements)
0
54
0
Order By: Relevance
“…[63] are performing well, while in term of diagonal values our algorithm, Refs. [63][64][65] are giving satisfactory values. While the overall and in terms of UACI and NPCR, the proposed 3C3R outperformed.…”
Section: Pixel Correlation Analysismentioning
confidence: 89%
“…[63] are performing well, while in term of diagonal values our algorithm, Refs. [63][64][65] are giving satisfactory values. While the overall and in terms of UACI and NPCR, the proposed 3C3R outperformed.…”
Section: Pixel Correlation Analysismentioning
confidence: 89%
“…Chaos theory is widely used in the encryption of information because of its particular properties [ 1 , 2 , 3 ], such as the high sensitivity to initial conditions, ergodicity, randomness, and topology complexity, among others [ 4 , 5 , 6 , 7 ]. For instance, numerous works related to the encryption of information using methods with chaotic and hyperchaotic models have been reported in [ 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 ].…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, the method reported by [ 73 ] is used for the encryption of information using multiple-precision arithmetic [ 83 ]. The Python programming language [ 84 ] is used to process several significant decimals higher than that reported in the works [ 1 , 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 16 , 17 , 18 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 , 51 ] and which are based on the IEEE 754 standard [ 54 ], typically used in computers and FPGAs. It is important to emphasize that Python is a scientific programming language [ 84 ] with the following advantages: open-source, free license, an...…”
Section: Introductionmentioning
confidence: 99%
“…The prominent properties of chaotic systems, such as sensitive to initial conditions, topologically mixing, and having dense periodic orbits, are ideal for building cryptography schemes [ 6 ]. Moreover, chaotic maps are iterative formulas, which in comparison to continuous time chaotic systems, are not required to establish the correct step size and numerical method to implement them in digital hardware, as demonstrated in [ 7 ].…”
Section: Introductionmentioning
confidence: 99%