2020
DOI: 10.1007/s10773-020-04402-7
|View full text |Cite
|
Sign up to set email alerts
|

An Encryption Scheme Based on Discrete Quantum Map and Continuous Chaotic System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 43 publications
(17 citation statements)
references
References 20 publications
0
17
0
Order By: Relevance
“…According to Table 4, the correlation coefficients for the original images are close to 1, but those for the ciphered images are very close to 0, which means the correlativeness shared between adjacent pixels is extremely rare. −0.0082 0.0118 −0.0012 [49] 0.0019 0.0014 −0.0028 [50] 0.0032 0.0015 −0.0018 [51] −0.0022 −0.0010 0.0005 [52] −0.0031 0.0027 0.00011…”
Section: Correlation Factor Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…According to Table 4, the correlation coefficients for the original images are close to 1, but those for the ciphered images are very close to 0, which means the correlativeness shared between adjacent pixels is extremely rare. −0.0082 0.0118 −0.0012 [49] 0.0019 0.0014 −0.0028 [50] 0.0032 0.0015 −0.0018 [51] −0.0022 −0.0010 0.0005 [52] −0.0031 0.0027 0.00011…”
Section: Correlation Factor Analysismentioning
confidence: 99%
“…According to Table 6, the proposed algorithm is also better than other algorithms for NPCR and UACI for Lena images. [48] 99.6051 33.4294 [49] 99.6218 33.4809 [50] 99.6164 33.4650 [51] 99.2975 33.4999 [52] 99.1507 33.4380…”
Section: Plaintext Senstivitymentioning
confidence: 99%
“…Musheer et al [17] used Particle Swarm Optimization for secure nonlinear component development. The S-boxes have also been used by many researchers in image encryption applications [18][19][20][21][22][23][24][25][26]. In [27] authors presented a 2D modular chaotification system for improving the complexity of chaos.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, researchers have offered numerous efficient image encryption techniques [5][6][7][8][9] based on various concepts and purposes. Chaos-based cryptography has been widely utilized for image encryption nowadays [10][11][12]. Chaos is considered a secure source of producing randomness in uniform data.…”
Section: Introductionmentioning
confidence: 99%