2019
DOI: 10.1016/j.amc.2019.04.078
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using complex hyper chaotic system by injecting impulse into parameters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 68 publications
(26 citation statements)
references
References 31 publications
0
26
0
Order By: Relevance
“…where M × N is the size of the image, P 1 (i, j) and P 2 (i, j), respectively, represent the pixel values of the positions corresponding to the plain and cipher. When the NPCR and UACI of the image are close to the ideal values of 99.6094070% and 33.4635070%, the algorithm has good safety [112,121]. As listed in Table 8, the algorithm in this paper is more sensitive to the plain than the NPCR and UACI values in References [111][112][113][114][115][116][117][118][119][120] can meet the security requirements and have a good ability to resist differential attacks.…”
Section: Information Entropymentioning
confidence: 84%
See 2 more Smart Citations
“…where M × N is the size of the image, P 1 (i, j) and P 2 (i, j), respectively, represent the pixel values of the positions corresponding to the plain and cipher. When the NPCR and UACI of the image are close to the ideal values of 99.6094070% and 33.4635070%, the algorithm has good safety [112,121]. As listed in Table 8, the algorithm in this paper is more sensitive to the plain than the NPCR and UACI values in References [111][112][113][114][115][116][117][118][119][120] can meet the security requirements and have a good ability to resist differential attacks.…”
Section: Information Entropymentioning
confidence: 84%
“…It can be seen that the adjacent pixels of the plain image have high correlation (r x,y ⟶ 1), and the adjacent pixels of the cipher image have low correlation (r x,y ⟶ 0). At the same time, compared with the corresponding results of References [111][112][113][114], it shows that the proposed encryption algorithm has lower correlation between adjacent pixels and can more effectively resist statistical attacks.…”
Section: Correlation Analysismentioning
confidence: 92%
See 1 more Smart Citation
“…For instance, Fowler et al [ 15 ] discovered the complex Lorenz system when they studied laser physics and baroclinic instability of the geophysical flows in 1982. Since then, the study on complex nonlinear systems has been paid a substantial amount of attentions and has become a hot topic due to its wide applications in chemical systems, optics and especially in secure communications [ 16 , 17 , 18 ]. A considerable amount of complex dynamical systems exhibit chaotic motion, such as the complex Chen system [ 19 ], the time-delay complex Lorenz system [ 20 ], the complex generalised Lorenz hyperchaotic system [ 21 ], just to name a few examples.…”
Section: Introductionmentioning
confidence: 99%
“…ese meaningful properties make chaotic systems widely studied and applied in many disciplines [4][5][6][7][8][9][10]. Specially, with the rapid development of information society chaos, secure communication has already been established to be a good candidate for transmission of con dential message [11][12][13].…”
Section: Introductionmentioning
confidence: 99%