2013
DOI: 10.1016/j.cnsns.2012.08.010
|View full text |Cite
|
Sign up to set email alerts
|

A symmetric color image encryption algorithm using the intrinsic features of bit distributions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
81
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 146 publications
(81 citation statements)
references
References 27 publications
0
81
0
Order By: Relevance
“…In the diffusion phase, the pixel values are modified with the manner that a minor change at one pixel level of the plain image leads to the corresponding cipher image to be significantly different. Therefore, many variants and improvements of the main architecture of chaos-based schemes are proposed including [4][5][6][7][8][9]43,44]. In [4], a combined architecture of both permutation-diffusion is considered as one phase is proposed, for the purpose of avoiding the duplicated scanning effort for obtaining pixel values, and improving the runtime, the scheme is resisted to known and chosen plaintext attacks by taking into account the extraction of information from the plain image.…”
Section: Introductionmentioning
confidence: 99%
“…In the diffusion phase, the pixel values are modified with the manner that a minor change at one pixel level of the plain image leads to the corresponding cipher image to be significantly different. Therefore, many variants and improvements of the main architecture of chaos-based schemes are proposed including [4][5][6][7][8][9]43,44]. In [4], a combined architecture of both permutation-diffusion is considered as one phase is proposed, for the purpose of avoiding the duplicated scanning effort for obtaining pixel values, and improving the runtime, the scheme is resisted to known and chosen plaintext attacks by taking into account the extraction of information from the plain image.…”
Section: Introductionmentioning
confidence: 99%
“…Here, a secret sequence must be introduced to satisfy this requirement. For simplicity, the chaos map based on (8) and (9) is used. If the plain image has rows, the number of pairs of steps and directions is .…”
Section: Improvementmentioning
confidence: 99%
“…Two ciphering matrices are computed by the pseudorandom number generator PRNG (8), which has been proven to have attractor's fractal structure, ergodicity, and an enormous key space [24]. …”
Section: Computing Ciphering Matricesmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore certain diffusion effect has been introduced in the confusion stage with a bit-level permutation. Thanks to the superior characteristics of bit-level operations and the intrinsic bit features of images, Zhang et al proposed a novel image encryption scheme using lightweight bitlevel confusion and cascade cross circular diffusion in [23] .They also applied an expand-andshrink strategy at bit-level to shuffle the image with reconstructed permuting plane [24]. All the proposed image encryption schemes show good performances compared with the traditional permutation-diffusion structure operating at pixel-level.…”
Section: Introductionmentioning
confidence: 99%