2020
DOI: 10.1007/s40747-020-00201-z
|View full text |Cite
|
Sign up to set email alerts
|

An ILM-cosine transform-based improved approach to image encryption

Abstract: The chaos-based cryptography techniques are used widely to protect digital information from intruders. The chaotic systems have some of special features that make them suitable for the purpose of encryption. These systems are highly unpredictable and are highly sensitive or responsive to the initial conditions, also known as butterfly effect. This sensitive dependence on initial conditions make these systems to exhibit an intricate dynamical behaviour. However, this dynamical behaviour is not much complex in s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(6 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…The existing chaotic maps like logistic map, and Sine map have less chaotic behavior, narrow range, uneven distribution, and blank widows. The equations of the logistic map and Sine map are (1) [27] and (2) respectively.…”
Section: Chaotic Systemmentioning
confidence: 99%
“…The existing chaotic maps like logistic map, and Sine map have less chaotic behavior, narrow range, uneven distribution, and blank widows. The equations of the logistic map and Sine map are (1) [27] and (2) respectively.…”
Section: Chaotic Systemmentioning
confidence: 99%
“…, (19) where XD(i) is the ith numerical element in the sequence XD, and i is an integer, i ∈ [1, M × N ].…”
Section: B(s D(i)) B A(x D(i)) V B B(s D(i)) ⊕ K (C D(i))mentioning
confidence: 99%
“…From Table 15, one may conclude that in contrast to the encryption schemes in Refs. [19,[23][24][25], which all process the three RGB components separately, our image encryption scheme implements a scrambling operation across the three RGB components, which effectively reduces the correlation of pixels among the components and the correlation between different components. And because our encryption scheme can be completely decrypted, the decrypted PSNR value can reach +∞.…”
Section: Comparative Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The defogging image recovery is an ill-posed inverse problem. In this paper, with the help of the physical model of fog formation, the energy optimization model of global defogging and local defogging of outdoor images is established [3].…”
Section: Introductionmentioning
confidence: 99%