2012 International Conference on Engineering and Technology (ICET) 2012
DOI: 10.1109/icengtechnol.2012.6396148
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption in the fractional-order domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
21
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 34 publications
(22 citation statements)
references
References 18 publications
1
21
0
Order By: Relevance
“…The selected bits for confusion should be highly chaotic and in the range from 0 to 255 as in (2). Let X, Y and Z be the outputs from Lorenz system, then…”
Section: A Confusion Processmentioning
confidence: 99%
See 1 more Smart Citation
“…The selected bits for confusion should be highly chaotic and in the range from 0 to 255 as in (2). Let X, Y and Z be the outputs from Lorenz system, then…”
Section: A Confusion Processmentioning
confidence: 99%
“…Block cipher encryption techniques usually include two confusion and diffusion stages and many of them depend on chaotic generators [1]. Recently, considerable research has been performed to increase the complexity of the confusion process using fractional-order chaotic systems [2], new Pseudo Random Number Generators (PRNG) based on fractal shapes [3], or generalized Feistel networks [4,5]. On the other hand, the diffusion process can be implemented using chaotic generators, discrete maps along with several chaotic systems, or chaotic generators along with S-Boxes [6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…Since then, many image encryption algorithms have been developed based on chaotic systems [2]- [4] . Since the last few years, fractional order extensions of the chaotic systems have become quite popular choice over the integer order versions because they provide much larger key-spaces [5], [6]. In the present work, we propose and demonstrate a scheme, in which multiple chaotic systems are combined to accomplish the algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…Different chaotic properties such as sensitive dependence on initial conditions and system parameters, pseudorandom property, non-periodicity and topological transitivity moti vate the scholars and researchers to set their eyes on the works involving chaotic encryption. Lately, fractional order extensions of some well known chaotic attractors have been developed and used for the purpose of encryption [6], [7]. These fractional order chaotic systems are known to provide a larger and more sensitive key space due to the fact that the dynamics of fractional order chaotic systems are not dependent only on the initial conditions but also on the derivative orders.…”
Section: Introductionmentioning
confidence: 99%