2007
DOI: 10.1007/978-3-540-72584-8_76
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Chaos-Based Image Encryption Scheme

Abstract: Abstract. Chaos theory provides a new approach to image encryption technology. The key stream generator is the key design issue of an image encryption system, it directly determines the security and efficiency of the system. This paper proposes an improved chaos-based key stream generator to enlarge the key space, extend the period and improve the linear complexity of the key stream under precision restricted condition so as to enhance the security of a chaos-based image encryption system. The generator is con… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Chaos Theory is the major researched source in the field of key generation of an image encryption based on its properties of sensitivity of initial value, random behaviors, non-periodic, unpredictable and Correlation properties (Fu et al, 2007). The Chaos system comprises two main phases: confusion and diffusion phases.…”
Section: Chaotic Map Methodsmentioning
confidence: 99%
“…Chaos Theory is the major researched source in the field of key generation of an image encryption based on its properties of sensitivity of initial value, random behaviors, non-periodic, unpredictable and Correlation properties (Fu et al, 2007). The Chaos system comprises two main phases: confusion and diffusion phases.…”
Section: Chaotic Map Methodsmentioning
confidence: 99%
“…The creation of block and encryption should be carried out in such a way that the encrypted image does not reveal any structural information about its original contents. Other recent approaches in image security are based on chaotic functions, which are characterized by ergodicity (stochastic behavior of image), extreme dependence on initial condition and randomness in the image [15][16][17]. The use of carrier image for the encryption of image has been presented in [18] using private key cryptosystem in the frequency domain.…”
Section: Image Encryptionmentioning
confidence: 99%
“…So, image security researches have become a hot issue in the current digital world. Accordingly, several algorithms are proposed for protecting digital images [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18]. Among them, chaotic based systems present several desired cryptographic characteristics such as an efficient and simple implementation which ensures a high encryption rate.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, several chaos-based ciphers have been suggested in the last decade. Some of them exploit 1-D chaotic systems for generating the required secret keys [7,12,18]. After generating the key, the image pixels are then shuffled and modified according to the obtained key.…”
Section: Introductionmentioning
confidence: 99%