Proceedings of the 2011 International Conference on Communication, Computing &Amp; Security - ICCCS '11 2011
DOI: 10.1145/1947940.1948060
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using a new chaos based encryption algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…where Q(γ , β) represents the quantum chaotic system, F(Q(γ , β)) is the chaotic sequence generated by (8), and L(x 0 , µ) represents the Logistic chaotic system with an initial value x 0 and a parameter r. Finally, a new uncorrelated chaotic sequence is generated by coupling with the Logistic map.…”
Section: B Constructing Cloud Model Fibonacci Chaotic System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…where Q(γ , β) represents the quantum chaotic system, F(Q(γ , β)) is the chaotic sequence generated by (8), and L(x 0 , µ) represents the Logistic chaotic system with an initial value x 0 and a parameter r. Finally, a new uncorrelated chaotic sequence is generated by coupling with the Logistic map.…”
Section: B Constructing Cloud Model Fibonacci Chaotic System Modelmentioning
confidence: 99%
“…A chaotic sequence is created by a chaotic map as a random sequence. Chaotic sequences are complex in structure and cannot be analyzed and predicted [7], [8], so they are widely used in image encryption. Many chaos-based encryption algorithms have been extensively studied and applied to the two steps of the common chaotic encryption scheme-scrambling and diffusion.…”
Section: Introductionmentioning
confidence: 99%
“…Each image is encrypted by using the seed values given in Table 1. On the last seed, a loop is done from 0.571410332 to 0.571411131 incrementing by 9 …”
Section: Key Sensitivity Analysismentioning
confidence: 99%
“…Here, the value of  is fixed to 3.9999 which corresponds to a highly chaotic case [7]. In the last decade, several schemes have used this function for image encryption [5,8,9]. The chaotic function is defined by the recurrence relation…”
Section: Introductionmentioning
confidence: 99%
“…The main concern of such algorithms is to meet the demand for fast and highly secure image transmission. There are two major groups of digital image encryption algorithms: non-chaos selective methods (i.e., traditional algorithms) and Chaos-based selective or non-selective methods [5]. Unfortunately, traditional image encryption algorithms were reported with low-level efficiency [2].…”
mentioning
confidence: 99%