2011
DOI: 10.1007/s11071-011-0155-7
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption algorithm using chaotic Chebyshev generator

Abstract: In this paper, we present a chaotic image encryption algorithm in which the key stream is generated by nonlinear Chebyshev function. The novel method of designing pseudorandom chaotic sequence is carried out with the created secret keys depending on with each other. We then make multiple permutation of pixels to decrease the strong correlation between adjacent pixels in original plain image. Further, a two-dimensional Chebyshev function is considered to avoid known-plaintext and chosen-plaintext attacks in dif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
98
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 189 publications
(98 citation statements)
references
References 25 publications
0
98
0
Order By: Relevance
“…Novel image encryption scheme with Chebyshev map based diffusion operations is presented in [3]. A novel design method of key stream by chaotic Chebyshev function is proposed in [4]. In [5], a secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map is presented.…”
Section: Introductionmentioning
confidence: 99%
“…Novel image encryption scheme with Chebyshev map based diffusion operations is presented in [3]. A novel design method of key stream by chaotic Chebyshev function is proposed in [4]. In [5], a secure Diffie-Hellman key agreement protocol based on Chebyshev chaotic map is presented.…”
Section: Introductionmentioning
confidence: 99%
“…In [6], the computational time is reduced by encrypting significant data in spatial domain and insignificant data in wavelet domain. Xiaoling Huang [8] proposed encryption scheme based on chaotic Chebyshev generator with multiple permutations to enhance the decorrelation. The authors of [9] proposed image encryption with circle map and is resistant against differential attacks.…”
Section: Literature Surveymentioning
confidence: 99%
“…Because the chaotic system has the characteristics of sensitivity to initial conditions and system parameters, pseudo randomness, uncertainty and ergodicity, it is consistent with the two basic principles of cryptography: diffusion and confusion. Digital image encryption based on chaos has been a hotspot; also, many image encryption algorithms based on chaos have been proposed [7][8][9][10][11]. However, these algorithms are all traditional ones based on diffusionscrambling structure.…”
Section: Introductionmentioning
confidence: 99%