2020
DOI: 10.1155/2020/9721675
|View full text |Cite
|
Sign up to set email alerts
|

Image Encryption Scheme Based on a Generalized Arnold Map and RSA Algorithm

Abstract: This study proposes a new image encryption scheme based on a generalized Arnold map and Rivest–Shamir–Adleman (RSA) algorithm. First, the parameters of the generalized Arnold map are generated by an asymmetric encryption-system RSA algorithm, and the keystream is produced iteratively. To change the distribution of pixel values, the image data are hidden by XOR diffusion. Second, both rows and columns of the image are cyclically confused to hide the image data again. Then, the additive mode diffusion operation … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 37 publications
(24 citation statements)
references
References 56 publications
0
24
0
Order By: Relevance
“…e proposed scheme uses elliptic curve random generator to produce a sequence of arbitrary numbers based on curves; then, the Advanced Encryption System is applied to the sequence to acquire arbitrary keys for encrypting image. Jiao et al [43] proposed an image encryption scheme based on a generalized Arnold map and RSA algorithm. In the scheme, RSA algorithm is used to generate the parameters of the generalized Arnold map.…”
Section: Related Workmentioning
confidence: 99%
“…e proposed scheme uses elliptic curve random generator to produce a sequence of arbitrary numbers based on curves; then, the Advanced Encryption System is applied to the sequence to acquire arbitrary keys for encrypting image. Jiao et al [43] proposed an image encryption scheme based on a generalized Arnold map and RSA algorithm. In the scheme, RSA algorithm is used to generate the parameters of the generalized Arnold map.…”
Section: Related Workmentioning
confidence: 99%
“…Reference [21] Reference [36] Reference [37] Reference [38] Figure 8: e bar chart of the PSNR. [11] 99.60 33.48 Reference [17] 99.6395 33.3992…”
Section: Oursmentioning
confidence: 99%
“…e encryption system can be symmetric [11,12] or asymmetric [13][14][15][16][17][18][19][20]. For a symmetric encryption system, the encryption and decryption processes use the same key that requires the transmission channel to be as safe as possible during the key transmission process.…”
Section: Introductionmentioning
confidence: 99%
“…e new chaotic system has good chaotic behavior, and the distribution of chaotic sequences is uniform. Image encryption was also realized by combining the Arnold map and the Rivest-Shamir-Adleman (RSA) algorithm [4]. First, the initial value of the Arnold map is generated by the RSA algorithm followed by the XOR diffusion operation.…”
Section: Introductionmentioning
confidence: 99%