2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA) 2018
DOI: 10.1109/iceca.2018.8474807
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Hybrid Chaotic Image Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…A wide range of cryptographic techniques and methods have been developed to secure transmitted data [10]. However, most of these algorithms have disadvantages when dealing with image data in terms of small key space, low level of security and high computational complexity [11,12]. To tackle these challenges in image protection, many chaos-based cryptographic algorithms have been suggested [12][13][14][15].…”
Section: Image Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…A wide range of cryptographic techniques and methods have been developed to secure transmitted data [10]. However, most of these algorithms have disadvantages when dealing with image data in terms of small key space, low level of security and high computational complexity [11,12]. To tackle these challenges in image protection, many chaos-based cryptographic algorithms have been suggested [12][13][14][15].…”
Section: Image Encryptionmentioning
confidence: 99%
“…However, most of these algorithms have disadvantages when dealing with image data in terms of small key space, low level of security and high computational complexity [11,12]. To tackle these challenges in image protection, many chaos-based cryptographic algorithms have been suggested [12][13][14][15]. These chaos-based security methods have many useful security properties: aperiodicity, unpredictable and non-linearity, high sensitivity to initial conditions and parameters, ergodicity, pseudorandomness, and other high permutation and diffusion properties [16].…”
Section: Image Encryptionmentioning
confidence: 99%