2022
DOI: 10.22266/ijies2022.0430.48
|View full text |Cite
|
Sign up to set email alerts
|

Image Cryptosystem for IoT Devices Using 2-D Zaslavsky Chaotic Map

Abstract: Recently, the proliferation of the Internet of Things (IoT) services and applications has prompted several governments to deploy many cameras in critical sites, such as embassies, military institutions, and ministries. The images must be encrypted to protect data shared between IoT sensors/devices and embedded subsystems. Often, IoT devices are smaller and less powerful. A lot of traditional encryption methods are computationally inefficient. They require many rounds of coding, which takes up much space on a d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…The study of chaotic systems, which have unpredictable appearances and irregular behaviors, is a subfield of mathematics. With sensitive beginning conditions, ergodic and regulated parameters, and irregular-like behavior similar to traditional cryptosystems' characteristics, chaotic crypto-systems had secured correspondences [30] [31].…”
Section: Chaotic Mapmentioning
confidence: 99%
“…The study of chaotic systems, which have unpredictable appearances and irregular behaviors, is a subfield of mathematics. With sensitive beginning conditions, ergodic and regulated parameters, and irregular-like behavior similar to traditional cryptosystems' characteristics, chaotic crypto-systems had secured correspondences [30] [31].…”
Section: Chaotic Mapmentioning
confidence: 99%
“…As images become more widely used in various industries, including ecommerce, the military, medical, education, aerospace, and more, both are becoming increasingly crucial. Both the number and sophistication of assaults against networks are well-known to be on the rise [3], [4], [5].…”
Section: Image Encryptionmentioning
confidence: 99%
“…George M. Zaslavsky introduced the novel strange attractor, a discrete-time nonlinear dynamical system, in 1978. The Zaslavsky equation demonstrates deterministic dynamic behavior, a crucial component of modern security algorithms [25][26][27][28][29][30] The proposed scheme is based on the following two Zaslavsky equations:…”
Section: Proposed Decimation-based Pseudorandom Byte Generationmentioning
confidence: 99%