2020
DOI: 10.1109/access.2020.3012912
|View full text |Cite
|
Sign up to set email alerts
|

Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution

Abstract: The evolution of wireless and mobile communication from 0G to the upcoming 5G gives rise to data sharing through the Internet. This data transfer via open public networks are susceptible to several types of attacks. Encryption is a method that can protect information from hackers and hence confidential data can be secured through a cryptosystem. Due to the increased number of cyber attacks, encryption has become an important component of modern-day communication. In this paper, a new image encryption algorithm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
45
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
4

Relationship

3
7

Authors

Journals

citations
Cited by 88 publications
(46 citation statements)
references
References 64 publications
0
45
0
1
Order By: Relevance
“…These simple chaotic maps exhibit unique properties including non-linearity (NL), sensitivity towards initial conditions, strange attractors with different initial keys, and randomness. These properties can be used in order to design a robust cryptosystem [27,29,30,33,40,41].…”
Section: Introductionmentioning
confidence: 99%
“…These simple chaotic maps exhibit unique properties including non-linearity (NL), sensitivity towards initial conditions, strange attractors with different initial keys, and randomness. These properties can be used in order to design a robust cryptosystem [27,29,30,33,40,41].…”
Section: Introductionmentioning
confidence: 99%
“…Unfortunately, all the offered cryptosystems claiming the robustness structure are not secure [18][19][20][21]. There exist many encryption phenomena exhibiting weak security with larger execution time [22][23][24][25][26][27]. The weakness in the encryption structure leads to cryptographic attacks [28].…”
Section: Introductionmentioning
confidence: 99%
“…e predominant applications of chaos are multimedia encryption applications. Chaotic maps were extensively deployed in various image encryption schemes [21][22][23][24][25][26][27][28]. In particular, chaos-oriented audio encryption algorithms are in limelight due to excellent cryptographic attributes.…”
Section: Introductionmentioning
confidence: 99%