2006
DOI: 10.1016/j.imavis.2006.02.021
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using chaotic logistic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
483
0
5

Year Published

2013
2013
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 1,089 publications
(489 citation statements)
references
References 12 publications
1
483
0
5
Order By: Relevance
“…Where x0 the initial value and R is the control parameter, are considered as the keys where the function has chaotic behavior for 0< <1 and 3.57 < R < 4 [17]. On the other side, the twodimensional logistic map gives the system more security and expressed by the following two equations, (3) and (4) [18]:…”
Section: Chaotic System (Logistic Mapping)mentioning
confidence: 99%
See 1 more Smart Citation
“…Where x0 the initial value and R is the control parameter, are considered as the keys where the function has chaotic behavior for 0< <1 and 3.57 < R < 4 [17]. On the other side, the twodimensional logistic map gives the system more security and expressed by the following two equations, (3) and (4) [18]:…”
Section: Chaotic System (Logistic Mapping)mentioning
confidence: 99%
“…On the other side, the twodimensional logistic map gives the system more security and expressed by the following two equations, (3) and (4) [18]:…”
Section: Chaotic System (Logistic Mapping)mentioning
confidence: 99%
“…Lenna image. Therefore, we perform fair comparisons between the proposed LSIC and peer methods [6], [14], [15], [16], [17], [44], [45], [46], [47], [48], [49], [50], [51], [52], [53], [54]. in three following aspects:…”
Section: A Experiments Settings and Datasetmentioning
confidence: 99%
“…2006 [54]), we directly cite these reports for comparisons. Furthermore, we turn off LSBNoiseEmbedding function in all simulations because we want to: General test pattern 1024 Gray…”
Section: A Experiments Settings and Datasetmentioning
confidence: 99%
“…efficiency [1][2]. The iterative permutation-diffusion operations, suggested by Shannon for secure ciphers constructions, are widely adopted in chaos-based image ciphers.…”
mentioning
confidence: 99%