2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO) 2015
DOI: 10.1109/icmsao.2015.7152261
|View full text |Cite
|
Sign up to set email alerts
|

An efficient image encryption scheme based on: Henon map, skew tent map and S-Box

Abstract: Due to easy and simple implementation, normally single 1-D chaotic maps like logistic and sine maps are employed in multimedia data encryption. However, data encrypted through a single chaotic map does not provide better security in terms of resistance against various attacks. In this paper, 2D Henon chaotic map and skew tent map are deployed in the design of an efficient chaos-based image encryption algorithm. To confuse the relationship between plaintext and ciphertext images, both chaotic maps play a key ro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
41
0
2

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 56 publications
(46 citation statements)
references
References 16 publications
0
41
0
2
Order By: Relevance
“…A large value of NPCR depicts good encryption quality. NPCR focuses on absolute number of differences while Unified Average Change Intensity (UACI) calculates the intensity of dissimilarities between the two images and can be defined as [14]:…”
Section: Deviation From a Uniform Histogrammentioning
confidence: 99%
“…A large value of NPCR depicts good encryption quality. NPCR focuses on absolute number of differences while Unified Average Change Intensity (UACI) calculates the intensity of dissimilarities between the two images and can be defined as [14]:…”
Section: Deviation From a Uniform Histogrammentioning
confidence: 99%
“…Due to these properties, reccurence (4) is very popular as a component of pseudorandom number generators in cryptographic applications [14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…In 1989, Mathews presented the concept of chaotic encryption (Matthews, 1984). Following Mathew's novel idea, many researchers have turned their attention towards chaos-based image encryption and S-box construction techniques Anees et al, 2014a;Khan et al, 2015a;Younas and Ahmad, 2014;Anees et al, 2014b;Dawei et al, 2004;Huang and Guan, 2005;Li and Zheng, 2002;Ahmad and Ahmed, 2010;Rehman et al, 2016;Khan et al, 2015b;Habib et al, 2017). These chaos-based image encryption algorithms have lots of merits, such as the large key space, ergodicity and sensitivity to the secret keys.…”
Section: Introductionmentioning
confidence: 99%