2021
DOI: 10.1155/2021/8824915
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Chaos‐Based Image Encryption Scheme Using Imitating Jigsaw Method

Abstract: In this paper, an efficient chaos-based image encryption scheme is proposed, which uses the imitating jigsaw method containing revolving and shifting operations. In this scheme, there are three processes in encryption: preprocessing, encryption process, and postprocessing. In the preprocessing, the original image is partitioned into 64 × 64 pixel image blocks and then randomly revolved and shifted under control sequences which are generated by the hyperchaotic Lorenz system whose initial conditions are calcula… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
25
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(25 citation statements)
references
References 63 publications
0
25
0
Order By: Relevance
“…In general, they are based on logistic [11], [12], [15], [17], [18], [21], [25], sine/cosine [23], [25], [29], memristive [24], henon [29], Chebyshev [32], coupled lattice [10] and cellular automata [31], [40]. As the cryptanalyses are compared among each other, the key-spaces in [10], [19], [22]- [24], [28], [32] can be regarded the shorter, those in [14], [18], [26], [36] are medium and those in [11], [16], [20], [21], [25], [29], [34], [35], [40], [41] are considered the longer. The mean entropy can be quantized better [20], moderate [14], [24]- [31], [41] and worse [10], [11], [15], [18], [19], [21],…”
Section: Related Studies and Comparisionmentioning
confidence: 99%
See 2 more Smart Citations
“…In general, they are based on logistic [11], [12], [15], [17], [18], [21], [25], sine/cosine [23], [25], [29], memristive [24], henon [29], Chebyshev [32], coupled lattice [10] and cellular automata [31], [40]. As the cryptanalyses are compared among each other, the key-spaces in [10], [19], [22]- [24], [28], [32] can be regarded the shorter, those in [14], [18], [26], [36] are medium and those in [11], [16], [20], [21], [25], [29], [34], [35], [40], [41] are considered the longer. The mean entropy can be quantized better [20], moderate [14], [24]- [31], [41] and worse [10], [11], [15], [18], [19], [21],…”
Section: Related Studies and Comparisionmentioning
confidence: 99%
“…As the cryptanalyses are compared among each other, the key-spaces in [10], [19], [22]- [24], [28], [32] can be regarded the shorter, those in [14], [18], [26], [36] are medium and those in [11], [16], [20], [21], [25], [29], [34], [35], [40], [41] are considered the longer. The mean entropy can be quantized better [20], moderate [14], [24]- [31], [41] and worse [10], [11], [15], [18], [19], [21], [32]- [34], [40]. As the mean correlation coefficients for diagonal, horizontal and vertical directions in [11], [12], [14], [24] seem lower, those in [15], [16], [31]- [36], [40], [41], [19]- [21], [23], …”
Section: Related Studies and Comparisionmentioning
confidence: 99%
See 1 more Smart Citation
“…ese features of chaotic maps enable them to be highly recommended for creating the confusion and diffusion in image encryption. For instance, see references [18][19][20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%
“…Some methods combine chaos theory and permutation techniques to improve the encryption results. For example, in [8] the authors proposed a chaos-based image encryption method and imitating the Jigsaw technique as a scrambling scheme, its proposal consists of three steps, a pre-processing, encryption, and post-processing stage, in pre-processing and post-processing stages the hyperchaotic Lorenz system is used to generate the control sequences of revolving and shifting image blocks, whilst in the encryption process, the skew tent system is applied to revolving image blocks. In [9] an image encryption system using the Jigsaw transform (JT) and the iterative finite field cosine transform is presented.…”
Section: Introductionmentioning
confidence: 99%