2023
DOI: 10.3390/math11030599
|View full text |Cite
|
Sign up to set email alerts
|

Generation of Boxes and Permutations Using a Bijective Function and the Lorenz Equations: An Application to Color Image Encryption

Abstract: Some images that contain sensitive information and travel through the network require security. Therefore, a symmetric cryptosystem that encrypts images and resists known attacks is developed. Subsequently, in this work, an encryption algorithm known as Image Cipher utilizing Lorenz equation and a Bijective Function—ICLEBF are proposed. In the proposal, the Lorenz equations and the Bijective function are used to generate boxes, the permutation, and schedule keys, considering that all these elements are differe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 53 publications
0
2
0
Order By: Relevance
“…Using the central limit theorem the statistic χ 2 approximates a normal distribution. In fact, the mean µ has a value of 255, and the standard deviation, σ, has a value of approximately 22.5 [40]; Also, it is taken into account that the information is graphed in a histogram of 256 possible levels. Furthermore, the significance level proposed in this work is α = 0.01.…”
Section: Goodness-of-fit Testmentioning
confidence: 99%
“…Using the central limit theorem the statistic χ 2 approximates a normal distribution. In fact, the mean µ has a value of 255, and the standard deviation, σ, has a value of approximately 22.5 [40]; Also, it is taken into account that the information is graphed in a histogram of 256 possible levels. Furthermore, the significance level proposed in this work is α = 0.01.…”
Section: Goodness-of-fit Testmentioning
confidence: 99%
“…The suggested method overcame the abovementioned restrictions and flaws, successfully securing and effectively safeguarding the color image. Chaotic systems are well-liked for picture encryption, such as Lorenz systems and their variations [23][24][25][26][27][28][29][30][31][32][33][34]. FOHCL system exhibits strong, intricate, and non-static.…”
Section: Introductionmentioning
confidence: 99%