2020
DOI: 10.3390/sym12030355
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption Algorithm Based on Tent Delay-Sine Cascade with Logistic Map

Abstract: We propose a new chaotic map combined with delay and cascade, called tent delay-sine cascade with logistic map (TDSCL). Compared with the original one-dimensional simple map, the proposed map has increased initial value sensitivity and internal randomness and a larger chaotic parameter interval. The chaotic sequence generated by TDSCL has pseudo-randomness and is suitable for image encryption. Based on this chaotic map, we propose an image encryption algorithm with a symmetric structure, which can achieve conf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(20 citation statements)
references
References 30 publications
0
20
0
Order By: Relevance
“…In our work, we have also used the aforementioned properties of chaos and proposed a scheme for protection data from attackers. Two chaotic maps, nonlinear chaos map [42] and Logistic map [43], are used in the encryption process, which is discussed in more detail in the latter part of the paper.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In our work, we have also used the aforementioned properties of chaos and proposed a scheme for protection data from attackers. Two chaotic maps, nonlinear chaos map [42] and Logistic map [43], are used in the encryption process, which is discussed in more detail in the latter part of the paper.…”
Section: Related Workmentioning
confidence: 99%
“…Now shuffle rows and columns of each channel with the sequence obtain from the chaos map and store value in , , and , respectively. Logistic map is written as [ 43 ]: In the above equation, and are initial conditions of map. Iterate Logistic map times and multiply the obtained value with and save the result in a row matrix R .…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Some of these methods are based on pixel-level permutation, and the nonequilibrium system with chaos was applied into the encryption by constructing some S-boxes [7]. Zhang et al [8] improved the chaotic map with delay and cascade. Meanwhile, bit-level permutation has been applied to some other algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Before performing it, a pixel-level scrambling is also done to randomize the plain image pixels. Another example of simultaneous pixel confusion and diffusion was proposed in [13]. Both processes were implemented through horizontal confusion-diffusion followed by vertical confusion-diffusion with the help of a newly proposed chaotic map, i.e., tent delay-sine cascade with the logistic map.…”
Section: Introductionmentioning
confidence: 99%