2020
DOI: 10.1155/2020/7913061
|View full text |Cite
|
Sign up to set email alerts
|

Design and Analysis of a Novel Chaos-Based Image Encryption Algorithm via Switch Control Mechanism

Abstract: Chaos has been widely used in image encryption due to its rich properties. However, it remains an irreconcilable contradiction for security and implementation efficiency for image encryption schemes. In this paper, a novel chaos-based image encryption scheme has been proposed, where the Lorenz chaotic system is applied to generate pseudorandom sequences with good randomness, and a random switch control mechanism is introduced to ensure the security of the encryption scheme. Experimental results demonstrate the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(16 citation statements)
references
References 42 publications
0
16
0
Order By: Relevance
“…RC4 is a quick stream cipher but it is not considered as a secure cipher any longer because of its vulnerability to a bit-flipping attack where one in every 256 keys can be a weak key. In addition, as shown by the previous studies [2], [35] as well as by our own evaluation in Section VIII-E, both AES and RC4 are not good in breaking the strong correlation amongst horizontally, vertically, and diagonally adjacent pixels of video frames.…”
Section: A Video Privacy-protection Techniquesmentioning
confidence: 69%
“…RC4 is a quick stream cipher but it is not considered as a secure cipher any longer because of its vulnerability to a bit-flipping attack where one in every 256 keys can be a weak key. In addition, as shown by the previous studies [2], [35] as well as by our own evaluation in Section VIII-E, both AES and RC4 are not good in breaking the strong correlation amongst horizontally, vertically, and diagonally adjacent pixels of video frames.…”
Section: A Video Privacy-protection Techniquesmentioning
confidence: 69%
“…Where a, b and c are constants of natural integers, a and b are generated from PWLCM. The equation ( 10) can be solved using the equation (11).…”
Section: { (9)mentioning
confidence: 99%
“…In [11] the pseudorandom numbers required for image encryption are generated by Lorenz chaotic map, the permutation of image rows and columns is carried out by random switch control mechanism. Equation ( 21) represents Lorenz chaotic map.…”
Section: Lorenz Chaotic Mapmentioning
confidence: 99%
“…. Generally, an algorithm key length of 128 bits is considered safe [44]; hence, the key space of the proposed encryption algorithm is secure against brute-force attacks.…”
Section: Key Space Analysismentioning
confidence: 99%