2021
DOI: 10.1016/j.ins.2020.09.055
|View full text |Cite
|
Sign up to set email alerts
|

Fractal sorting matrix and its application on chaotic image encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
131
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 359 publications
(131 citation statements)
references
References 36 publications
0
131
0
Order By: Relevance
“…Office Cryptographic algorithms are the cornerstone of information security, and design methods based on HRCA can also be used in image and data encryption. For image encryption, including image parallel encryption [51], a chaotic system can be used to generate random keys [52] and chaotic image encryption methods [53], [54] to improve the security and resistance of the algorithm. In order to improve the speed of image encryption, a variety of schemes such as the chaotic communication system [55], chaotic pseudo random number generator [56], chaos blend DNA coding [57], and chaotic map image encryption [58]- [61] have been implemented on FPGAs.…”
Section: Sha1mentioning
confidence: 99%
“…Office Cryptographic algorithms are the cornerstone of information security, and design methods based on HRCA can also be used in image and data encryption. For image encryption, including image parallel encryption [51], a chaotic system can be used to generate random keys [52] and chaotic image encryption methods [53], [54] to improve the security and resistance of the algorithm. In order to improve the speed of image encryption, a variety of schemes such as the chaotic communication system [55], chaotic pseudo random number generator [56], chaos blend DNA coding [57], and chaotic map image encryption [58]- [61] have been implemented on FPGAs.…”
Section: Sha1mentioning
confidence: 99%
“…Various researchers use maps like Lorentz map, Arnold-Tent map, Cat map, etc., to generate random numbers so that they can be applied on the image to change the original pixel values (substitution or diffusion) and to shift the position of actual pixel values (permutation or confusion). To enhance the security in all levels, the researchers use the concepts of DNA sequence operation [5], Cellular Automata [6], substitution-box [7,8], finite-state machine [9], fractal sorting matrix [10], bit-level permutation [11], compressive sensing [12,13], etc., along with chaos-based cryptography.…”
Section: Introductionmentioning
confidence: 99%
“…Researchers in their new works clearly show the design of one-dimensional (1D) chaotic systems [14,16,17] and multidimensional chaotic maps [10][11][12][13] with an exclusive application in image encryption. Every work is focusing on how effectively we can improve various measures of security analysis.…”
Section: Introductionmentioning
confidence: 99%
“…These conventional methods therefore are less useful in image encryption cryptography, especially for rapid communication applications. We can now realize that more and more research has been done to develop modern encryption algorithms [7]- [10]. For instance chaos based encryption are used to protect the transferred information from attacks [9].…”
Section: Introductionmentioning
confidence: 99%
“…They used to investigate the dynamical properties of the proposed systems focusing on potential striking dynamical behavior including periodic attractors, chaotic attractors or hyperchaotic attractors, antimonotonicity, period doubling, crises, hysteresis, and coexisting bifurcations [11], [12]. Note that some of these properties and behaviors may be useful to image encryption in order to increase the number of encryption keys [7], [8].…”
Section: Introductionmentioning
confidence: 99%