2005
DOI: 10.1016/j.physleta.2005.08.006
|View full text |Cite
|
Sign up to set email alerts
|

Chaos-based image encryption algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
264
0
4

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 628 publications
(269 citation statements)
references
References 8 publications
1
264
0
4
Order By: Relevance
“…They can be generated by the internal functions defined in advance. By means of the transform ( ) y a b a x    , a uniform distribution random matrix can be obtained in the arbitrary interval [ , ] a b , where the random variable x satisfies the uniform distribution in the interval [0,1] . Similarly, the formula y x     can be used to generate the random numbers with the mean and variance of  and 2  respectively, where x obeys the standard normal distribution.…”
Section: Random Matricesmentioning
confidence: 99%
See 3 more Smart Citations
“…They can be generated by the internal functions defined in advance. By means of the transform ( ) y a b a x    , a uniform distribution random matrix can be obtained in the arbitrary interval [ , ] a b , where the random variable x satisfies the uniform distribution in the interval [0,1] . Similarly, the formula y x     can be used to generate the random numbers with the mean and variance of  and 2  respectively, where x obeys the standard normal distribution.…”
Section: Random Matricesmentioning
confidence: 99%
“…On the other hand, the decryption can be implemented by the inverse operation of formula (1). This step is demonstrated in formula (2).…”
Section: Image Sequences Encryption Based On the Element-by-element Mmentioning
confidence: 99%
See 2 more Smart Citations
“…On the other hand, chaotic system has attracted tremendous interest from researchers thanks to its good features, such as ergodicity, pseudo-randomness and sensitivity to initial conditions and control parameters, which are in line with the basic requirements, like confusion and diffusion, in cryptography [2,3]. These good chaotic properties make chaotic systems potential for constructing cryptosystems in multimedia field [3][4][5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%