2020
DOI: 10.1016/j.asej.2019.07.009
|View full text |Cite
|
Sign up to set email alerts
|

Chaos based 3D color image encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…[19,37,38,45,46], the sine function selected as Equation (8); in Ref. [14], the sine function selected as Equation (9), and the sine function selected as Equation (10) in Refs. [47,48].…”
Section: A Novel Chaotic System For Generating 3-d Multi-scroll Chaot...mentioning
confidence: 99%
See 2 more Smart Citations
“…[19,37,38,45,46], the sine function selected as Equation (8); in Ref. [14], the sine function selected as Equation (9), and the sine function selected as Equation (10) in Refs. [47,48].…”
Section: A Novel Chaotic System For Generating 3-d Multi-scroll Chaot...mentioning
confidence: 99%
“…If the sine functions in the form of Equations ( 8) and (10) are used directly to the chaotic system, the number of scrolls will be varied with transient simulation time. In order to generate a constant number of scrolls by using a sine function, a state feedback controller is used [46], for the same purpose, we change the expression of the sine function as Equation (3).…”
Section: A Novel Chaotic System For Generating 3-d Multi-scroll Chaot...mentioning
confidence: 99%
See 1 more Smart Citation
“…Then how to ensure the security of image information in the transmission process becomes an important issue that people pay attention to. It is worth mentioning that with its inherent ergodicity, randomness and sensitivity to initial conditions, chaotic systems are widely used in the field of image encryption [6][7][8][9][10][11][12][13][14][15].…”
Section: Introductionmentioning
confidence: 99%
“…However, the logistic map is not secure enough because of its small chaotic space and is vulnerable to brute force attacks. Although some existing image encryption algorithms have high security [6,[27][28][29][30][31][32], many of them are only suitable for specific types of image encryption, such as color image and medical image, and cannot handle all types of digital images. The defects of these existing image encryption schemes have aroused our motivation to design a new image encryption scheme that is safe, fast and universal.…”
Section: Introductionmentioning
confidence: 99%