2012 National Conference on Computing and Communication Systems 2012
DOI: 10.1109/ncccs.2012.6412989
|View full text |Cite
|
Sign up to set email alerts
|

Confusion and diffusion of grayscale images using multiple chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…The results demonstrate that the grayscale images can be successfully encrypt and decrypt with secret keys by proposed algorithm. It also present that the proposed method is secure, loss-less, and resourceful [5].…”
Section: Confusion and Diffusion Of Grayscale Images Using Multiplementioning
confidence: 82%
See 1 more Smart Citation
“…The results demonstrate that the grayscale images can be successfully encrypt and decrypt with secret keys by proposed algorithm. It also present that the proposed method is secure, loss-less, and resourceful [5].…”
Section: Confusion and Diffusion Of Grayscale Images Using Multiplementioning
confidence: 82%
“…Further, the effectiveness and robustness of Multiple Chaotic Maps [5] scrambled image at a particular iteration is the proposed image encryption encrypted using chaotic sequences algorithm A Keyless approach to Lossless Pratibha S. Ghode, Three different approaches being followed Proposed encryption algorithm Image Encryption [7] 2014 in image encryption, the first approach to can ensure the lossless of key oriented encryption and second transmissions of images and approach to Image splitting and the final increase the security level and approach multiple shares. decrease the CPU computational time.…”
Section: Image Security Via Genetic Rasulmentioning
confidence: 99%
“…The relation between entropy and the mentioned two properties were studied in several research works. For example, entropy was used to evaluate the security of chaotic confusion–diffusion image encryption schemes [ 149 , 150 ]. Moreover, Wu et al [ 151 ] used entropy improvement techniques in combination with confusion and diffusion mechanisms in their proposed cryptographic schemes.…”
Section: Entropy and Encryptionmentioning
confidence: 99%
“…Xu et al, 2012 [8] used fast image encryption schemes. Henon map is adopted in Wei-bin and Xin, 2012 [9] to encrypt the shuffled the image, while Som and Kotal, 2012 [10] use 1D logistic map for generation of keys for encryption of pixels. Yun-peng et al, 2009 [11] combine the advantages of DES and chaos.…”
Section: Related Workmentioning
confidence: 99%