2009 International Conference on Networks Security, Wireless Communications and Trusted Computing 2009
DOI: 10.1109/nswctc.2009.201
|View full text |Cite
|
Sign up to set email alerts
|

An Encryption Algorithm Based on Transformed Logistic Map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
8
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…The characteristics of system varies in accordance to the value of parameter r , which is also known as bifurcation parameter. System would be more chaotic if value of r would be close to 4 [16,17]. Figure 1a depicts the characteristics of the system according to the value of parameter r .…”
Section: Lm and Ilmmentioning
confidence: 99%
See 2 more Smart Citations
“…The characteristics of system varies in accordance to the value of parameter r , which is also known as bifurcation parameter. System would be more chaotic if value of r would be close to 4 [16,17]. Figure 1a depicts the characteristics of the system according to the value of parameter r .…”
Section: Lm and Ilmmentioning
confidence: 99%
“…LM produces chaotic sequences with good cross-correlation and autocorrelation properties. However, it has demerits such as weak key, stable windows, blank windows and non-uniform sequence distribution [16,17]. Figure 1b depicts the blank window by the use of LM when value of parameter r 3.828.…”
Section: Lm and Ilmmentioning
confidence: 99%
See 1 more Smart Citation
“…Their secure transmission plays a vital role in personal and military privacy. In recent years, many chaotic image encryption algorithms have been proposed [1][2][3][4][5][6][7][8][9][10] due to the excellent properties of chaotic maps, such as initial value sensitivity and intrinsic randomness.…”
Section: Introductionmentioning
confidence: 99%
“…Obtain x 2 (1), x 2 (2), n 2 , u 2 from the secret key and and calculate the initial value as well as iteration time of chaotic map by adjusting them with the pixel value of image I according to Equation (7).…”
mentioning
confidence: 99%