2012
DOI: 10.1007/s11071-012-0402-6
|View full text |Cite
|
Sign up to set email alerts
|

An intertwining chaotic maps based image encryption scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
16
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 95 publications
(16 citation statements)
references
References 16 publications
0
16
0
Order By: Relevance
“…Typically, a chaotic based image encryption scheme consists of two stages: permutation and diffusion [1][2][3][4][5][6]. The adjacent pixels are decorrelated by employing the permutation and spreading the effect of the individual pixels across the entire image is achieved by using diffusion.…”
Section: Literature Surveymentioning
confidence: 99%
See 4 more Smart Citations
“…Typically, a chaotic based image encryption scheme consists of two stages: permutation and diffusion [1][2][3][4][5][6]. The adjacent pixels are decorrelated by employing the permutation and spreading the effect of the individual pixels across the entire image is achieved by using diffusion.…”
Section: Literature Surveymentioning
confidence: 99%
“…In [5], an image encryption scheme based on an intertwining chaotic map is proposed to increase the keys pace and security. The substitution process uses six arbitrarily chosen odd integers to permute and then xored with the first chaotic key to shuffle and change the image pixel values.…”
Section: Literature Surveymentioning
confidence: 99%
See 3 more Smart Citations