2012
DOI: 10.1117/1.jei.21.1.013014
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption using the two-dimensional logistic chaotic map

Abstract: Shuliang Sun, "Chaotic image encryption scheme using two-by-two deoxyribonucleic acid complementary rules," Abstract. An image encryption technique has been proposed using deoxyribonucleic acid (DNA) operations and chaotic map in this scheme. First, initial conditions of row encryption and column encryption are calculated. Then, a two-dimensional sine iterative chaotic map with infinite collapse (ICMIC) modulation map (2D-SIMM) is adopted to produce chaotic sequences. Extended exclusive OR (XOR) is executed to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
149
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 277 publications
(149 citation statements)
references
References 28 publications
0
149
0
Order By: Relevance
“…Chaotic systems have the following properties: pseudorandomness, extreme sensitivity to the initial values and system parameters, ergodicity, and unpredictability, which make it very suitable for image encryption [10]. Typically, chaos-based image encryption framework includes chaotic sequence generation, pixel position permutation, and pixel value diffusion.…”
Section: Introductionmentioning
confidence: 99%
“…Chaotic systems have the following properties: pseudorandomness, extreme sensitivity to the initial values and system parameters, ergodicity, and unpredictability, which make it very suitable for image encryption [10]. Typically, chaos-based image encryption framework includes chaotic sequence generation, pixel position permutation, and pixel value diffusion.…”
Section: Introductionmentioning
confidence: 99%
“…They are mostly based on chaotic and logistic maps, pixel swapping, pixel scrambling schemes, etc. [10][11][12][13][14][15]. Rubik's cube scrambling has been adapted by many researchers [11,15].…”
Section: Related Workmentioning
confidence: 99%
“…[10][11][12][13][14][15]. Rubik's cube scrambling has been adapted by many researchers [11,15]. Many researchers working on "encryption while compression" for reducing the complexity rather than independent encryption.…”
Section: Related Workmentioning
confidence: 99%
“…A trajectory map is shown to ensure that the used 2D Sine-Tent composite function has excellent chaotic behavior. A Figure 2 compares the trajectories of 2D-STCM, 2D-SLMM [10] and 2D Logistic map [41] defined in the given functions respectively. 2D-SLMM Function:…”
Section: Trajectorymentioning
confidence: 99%