2021
DOI: 10.1016/j.ins.2020.11.045
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using q-deformed logistic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(18 citation statements)
references
References 38 publications
0
18
0
Order By: Relevance
“…Maria [29] introduced a scheme for image encipherment based on a q-deformed chaotic logistic map, which maximizes key spaces despite low dimensions. Ibrahim et al [30] designed an efficient scheme by combining a chaotic system and the S-box to resist PRING reset attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Maria [29] introduced a scheme for image encipherment based on a q-deformed chaotic logistic map, which maximizes key spaces despite low dimensions. Ibrahim et al [30] designed an efficient scheme by combining a chaotic system and the S-box to resist PRING reset attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Components that take up the most time in the proposed algorithm include DNA encoding, decoding and chaotic sequence generation. 0.9055 [19] 0.9149 [29] 0.8711 [33] 1.0264 [42] 0.9021…”
Section: Encryption Speedmentioning
confidence: 99%
“…Muoz-Guillermo et al [27] proposed an image encryption algorithm based on the deformation of the logistic map. Using a chaotic q-deformed logistic map cannot only expand the key space, but can also be used to avoid the parameter area of the key selection in the nonchaotic area.…”
Section: Chaotic Encryption Technologymentioning
confidence: 99%
“…Encryption is an effective means commonly used to keep information confidential. However, traditional text encryption standards such as the data encryption standard (DES), advanced encryption standard (AES) and Rivest-Shamir-Adleman (RSA) algorithm cannot efficiently encrypt the images with huge data volumes, high temporal redundancy, and spatial redundancy [1]. The high sensitivity to initial values and the uncertain behavior of chaotic systems renders them more suitable for image encryption [2].…”
Section: Introduction 1research Backgroundmentioning
confidence: 99%
“…Such a method not only disrupts the position of the pixels, but also changes the statistical characteristic of the plaintext image [3]. Inspired by Fridrich's research, many encryption algorithms using similar encryption frameworks have been proposed in recent years [1,.…”
Section: Introduction 1research Backgroundmentioning
confidence: 99%