2009 7th International Conference on Information, Communications and Signal Processing (ICICS) 2009
DOI: 10.1109/icics.2009.5397632
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid image encryption using multi-chaos-system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 11 publications
0
15
0
Order By: Relevance
“…The disadvantage of merging the above schemes will causes to increase the key space of digital images and suffers from resisting the extensive attack when correlation factor is accessed to 0.0031. R. Munir [12] presents a method that uses the Arnold Cat map transformation on the low frequency sub-band (LL) of the DCT to encrypt digital image. Their essential notion for choosing LL of the DCT transformation of digital image is certified to the fact that the human visual system (HVS) is more figured to important data (such as object, shape) at the low frequencies area.…”
Section: A Image Encryptionmentioning
confidence: 99%
“…The disadvantage of merging the above schemes will causes to increase the key space of digital images and suffers from resisting the extensive attack when correlation factor is accessed to 0.0031. R. Munir [12] presents a method that uses the Arnold Cat map transformation on the low frequency sub-band (LL) of the DCT to encrypt digital image. Their essential notion for choosing LL of the DCT transformation of digital image is certified to the fact that the human visual system (HVS) is more figured to important data (such as object, shape) at the low frequencies area.…”
Section: A Image Encryptionmentioning
confidence: 99%
“…Since then, many image encryption algorithms have been developed based on chaotic systems [2]- [4] . Since the last few years, fractional order extensions of the chaotic systems have become quite popular choice over the integer order versions because they provide much larger key-spaces [5], [6].…”
Section: Introductionmentioning
confidence: 99%
“…al. [4] proposed an encryption method that used multi-chaotic systems to increase the key space and to make system's breaking very difficult. Zhu.…”
Section: Introductionmentioning
confidence: 99%