2013
DOI: 10.1016/j.optlaseng.2013.01.001
|View full text |Cite
|
Sign up to set email alerts
|

An authenticated image encryption scheme based on chaotic maps and memory cellular automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
47
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 131 publications
(50 citation statements)
references
References 23 publications
1
47
0
Order By: Relevance
“…It is known that a cellular automaton (CA) can be used to encrypt images efficiently [6][7][8][9][10][11], and using an image scrambling algorithm can make the entire encryption system safer and more reliable [12][13][14]. In computer science and mathematics, the Josephus problem is a theoretical problem related to a certain counting-out game [15].…”
Section: Introductionmentioning
confidence: 99%
“…It is known that a cellular automaton (CA) can be used to encrypt images efficiently [6][7][8][9][10][11], and using an image scrambling algorithm can make the entire encryption system safer and more reliable [12][13][14]. In computer science and mathematics, the Josephus problem is a theoretical problem related to a certain counting-out game [15].…”
Section: Introductionmentioning
confidence: 99%
“…Images transmission in the network must be encrypted to ensure the safety and secrecy of the images in many applications, such as military records and confidential business data. The common approach to protect the image is ordinary data encryption and steganography [1,2]. But there is a drawback of these techniques.…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, these algorithms are vulnerable to chosen-plaintext attacks [1,23]. Consequently, many other encryption schemes that are not susceptible to this type of attack have been proposed [3,5,12,13,21].…”
Section: Introductionmentioning
confidence: 99%