2018
DOI: 10.1109/tifs.2018.2812080
|View full text |Cite
|
Sign up to set email alerts
|

Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
101
0
4

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 218 publications
(105 citation statements)
references
References 50 publications
0
101
0
4
Order By: Relevance
“…Important research [5] demonstrates that using a single chaotic map is not always a guarantee for highest levels of cryptographic security. The research overviews how encryption algorithms, using Arnold's Cat Map, Baker's Map or Two-Dimensional Logistic Chaotic Map may be vulnerable.…”
Section: Introductionmentioning
confidence: 99%
“…Important research [5] demonstrates that using a single chaotic map is not always a guarantee for highest levels of cryptographic security. The research overviews how encryption algorithms, using Arnold's Cat Map, Baker's Map or Two-Dimensional Logistic Chaotic Map may be vulnerable.…”
Section: Introductionmentioning
confidence: 99%
“…Privacy preservation of videos is performed by implementing the following stages on individual frames of video as shown in Neutrosophic set is a generalization of the intuitionistic set [21], fuzzy set [22], paraconsistent set [23], dialetheist set [24], paradoxist set and tautological set [25].…”
Section: Proposed Methodologymentioning
confidence: 99%
“…The XOR is widely used in chaotic schemes by the researchers. An interesting study is [23], which considers the use of XOR encryption both in chaotic stream ciphers and two other schemes. Chaotic encryption is designed to avoid the computational overhead of full encryption with a block-based cipher but as the authors of [23] indicate, it has shortcomings if XOR encryption is employed.…”
Section: Selective Encryptionmentioning
confidence: 99%
“…In the context of IoT-based video surveillance, in [71] only key frames were encrypted with a chaotic encryption scheme. However, the weakness of some tests used to justify the security of such chaotic encryption schemes was questioned in [23], as was the relative encryption speed compared to conventional block-based encryption methods. Instead, the authors of [72], for a secure but lightweight IoT-based video streaming scheme, preferred to employ conventional block-based encryption.…”
Section: Related Workmentioning
confidence: 99%