2022
DOI: 10.1007/s11042-022-12595-8
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption based on a combination of multiple chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
32
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 94 publications
(33 citation statements)
references
References 53 publications
1
32
0
Order By: Relevance
“…Additionally, the approximate keyspace shown in Table 6 is higher than state-of-the-art encryption schemes. Ref [45] Ref [42] Ref [29] Ref [16] Proposed In future, we plan to transform the proposed scheme into an asymmetric image encryption scheme. Another interesting future direction could be to modify this scheme to work for video encryption.…”
Section: Comparison Of the Keyspacementioning
confidence: 99%
“…Additionally, the approximate keyspace shown in Table 6 is higher than state-of-the-art encryption schemes. Ref [45] Ref [42] Ref [29] Ref [16] Proposed In future, we plan to transform the proposed scheme into an asymmetric image encryption scheme. Another interesting future direction could be to modify this scheme to work for video encryption.…”
Section: Comparison Of the Keyspacementioning
confidence: 99%
“…To that end, scientists and engineers have been making use of various mathematical constructs and ideas inspired by nature to design secure and robust image encryption algorithms. Recent literature shows the employment of cellular automata (CA) [20][21][22], DNA coding [8,[23][24][25], electric circuits [26,27], as well as heavy reliance on dynamical functions of chaotic behavior [6,[28][29][30][31][32]. The following paragraph highlights the utilization of various such ideas in the development of pseudo-random number generators (PRNGs) to build encryption keys and substitution boxes (S-boxes).…”
Section: Of 42mentioning
confidence: 99%
“…These traits include periodicity, pseudo-randomness, sensitivity to initial values, and ergodicity [42]. Broadly, these functions are categorized as either low-dimensional (LD) or high-dimensional (HD), with each class having a set of exclusive advantages [6]. LD chaotic functions dramatically simplify software and hardware implementations, but their use in image cryptosystems could in some cases be insufficiently secure.…”
Section: Of 42mentioning
confidence: 99%
See 1 more Smart Citation
“…T HE development of technology has facilitated the advancement of life quality [1]. High-tech electrical products are gradually becoming more prevalent in everyday life.…”
Section: Introductionmentioning
confidence: 99%