2017
DOI: 10.1016/j.optlaseng.2017.04.009
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption based on new Beta chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
74
0
4

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 180 publications
(81 citation statements)
references
References 25 publications
1
74
0
4
Order By: Relevance
“…In this paper, plain image is utilized only for scrambling and not for diffusion. In Rim et al [23] technique, beta maps are utilized to generate chaotic sequences for encryption algorithm. They additionally adopt permutationsubstitution network structure for encrypting the images.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, plain image is utilized only for scrambling and not for diffusion. In Rim et al [23] technique, beta maps are utilized to generate chaotic sequences for encryption algorithm. They additionally adopt permutationsubstitution network structure for encrypting the images.…”
Section: Introductionmentioning
confidence: 99%
“…Comparing the NPCR and UACI values of the present algorithm with those of algorithms proposed in [22,24] and the original AES, it can be concluded that the security of the CCAES algorithm and those of [22,24] against the differential attacks is more than that in the original AES one. Also, due to the satisfactory values of UACI and NPCR, the present algorithm meets the requirements for resisting the differential attacks.…”
Section: Algorithm's Sensitivity Analysis To the Original Imagementioning
confidence: 85%
“…A beta-based chaos map was used for generating the chaos sequence [3]. This approach is divided into three steps: permutation, diffusion and substitution.…”
Section: Encryption Algorithms Using the Chaos Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Zahmoul et al [3] proposed new chaotic maps to enlarge bifurcation parameters and also to strengthen the chaotic system. In recent years, hyper chaotic image encryption schemes are formulated to provide much complexity to the dynamical systems [6,22] as they highly reactive to the initial condition and non-convergence in nature.…”
mentioning
confidence: 99%