2021
DOI: 10.1007/s11071-021-06663-1
|View full text |Cite
|
Sign up to set email alerts
|

Color image encryption based on cross 2D hyperchaotic map using combined cycle shift scrambling and selecting diffusion

Abstract: A novel color image encryption algorithm based on a cross 2D hyperchaotic map is proposed in this paper. The cross 2D hyperchaotic map is constructed using one nonlinear function and two chaotic maps with cross structure. Chaotic behaviors are illustrated using bifurcation diagrams, Lyapunov exponent spectra and phase portraits, etc. In the color image encryption algorithm, the keys are generated using hash function SHA-512 and the information of plain color image. First, the color plain image is converted to … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 127 publications
(28 citation statements)
references
References 47 publications
0
28
0
Order By: Relevance
“…Teng et al [16] proposed a new image encryption method based on a cross 2D hyper-chaotic map. The keys are constructed by the hash function (SHA-512) and the plain image.…”
Section: Introductionmentioning
confidence: 99%
“…Teng et al [16] proposed a new image encryption method based on a cross 2D hyper-chaotic map. The keys are constructed by the hash function (SHA-512) and the plain image.…”
Section: Introductionmentioning
confidence: 99%
“…where a and b are system parameters, a, b ∈ [1, 100], x and y are system variables. To evaluate the chaos performance of 2D-LTMM, the bifurcation diagram of 2D-LTMM is presented in this section and compared with the trajectory diagram of 2D-SCCM [28], 2D-LSMCL [29], 2D-HM [30] and Lyapunov index spectrum, as shown in Figs. 2, 3 and 4.…”
Section: ) 2d-ltmmmentioning
confidence: 99%
“…2022 is effective at repelling the entropy attack. If the entropy is significantly less than the maximum value, however, the encoded image is ineffective and cannot withstand an entropy attack [24][25][26][27]. The following formula is used to calculate entropy:…”
Section: Examination Of Information Entropymentioning
confidence: 99%