2017
DOI: 10.15388/informatica.2017.149
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Image Encryption Scheme Based on a Non-Linear Chaotic Algorithm and Substitution Boxes

Abstract: World has become a global village after introduction of social media and social networks. However, it extensively increased the demand for network resources, particularly multimedia traffic like images, videos and audio. The medium for this extensive traffic is always public networks such as internet or cellular networks. But the open nature of such network like internet always creates security threats for data during transmission. Due to many intrinsic features and higher correlation in multimedia traffic, ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
7
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(7 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…Despite the fact that Fridrich's scheme is shown to suffer from security issues under chosen cipher-image scenario (Solak et al, 2010;Xie et al, 2017), Fridrich's approach has been adopted in the designs of most proposed chaos-based image encryption schemes. Throughout the last two decades, a number of chaos-based image encryption schemes have been developed (Chen et al, 2004;Guan et al, 2005;Behnia et al, 2008;Zhang et al, 2010;Liu Y. et al, 2016;Hua et al, 2015;Ghebleh, 2012, 2015a;Khan et al, 2017;Fu et al, 2018;Khan and Shah, 2015). Chen et al (2004) proposed an image encryption scheme that employs a 3-dimensional (3D) cat map.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Despite the fact that Fridrich's scheme is shown to suffer from security issues under chosen cipher-image scenario (Solak et al, 2010;Xie et al, 2017), Fridrich's approach has been adopted in the designs of most proposed chaos-based image encryption schemes. Throughout the last two decades, a number of chaos-based image encryption schemes have been developed (Chen et al, 2004;Guan et al, 2005;Behnia et al, 2008;Zhang et al, 2010;Liu Y. et al, 2016;Hua et al, 2015;Ghebleh, 2012, 2015a;Khan et al, 2017;Fu et al, 2018;Khan and Shah, 2015). Chen et al (2004) proposed an image encryption scheme that employs a 3-dimensional (3D) cat map.…”
Section: Introductionmentioning
confidence: 99%
“…In Kanso and Ghebleh (2015a), a new family of 4D cat maps is proposed together with an image encryption scheme for medical applications. Khan et al (2017) proposed a chaos-based image encryption scheme that utilizes a non-linear chaotic algorithm for destroying correlation and diffusion in plain-image. In Fu et al (2018), Fu et al proposed an algorithm based on a 4D hyper-chaotic system in conjunction with the hash function SHA-224.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Some novel solutions are even improvements of concepts well known to the automobile industry (i.e. car keys) (Grosse and Upadhyay, 2013); others are based asymmetric cyphers (Sakalauskas and Mihalkovich, 2017), on certificateless key encapsulations (Gao et al, 2017;Wu et al, 2018), ID-based cryptography (Meshram et al, 2017), or image-based encryption (Khan et al, 2017).…”
Section: Introductionmentioning
confidence: 99%
“…The image encryption scheme based on chaotic mapping and orthogonal matrix solves the problem that traditional image encryption schemes cannot deal with big data such as noise tolerance and compression [15]. An improved image encryption scheme based on nonlinear chaos algorithm and replacement box is proposed [16]. Khan et al [17] has improved the gingerbread-man chaotic map and S 8 permutation to solve its security problems.…”
Section: Introductionmentioning
confidence: 99%