2018
DOI: 10.1016/j.ijleo.2018.06.029
|View full text |Cite
|
Sign up to set email alerts
|

Multiple-image encryption by using robust chaotic map in wavelet transform domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 68 publications
(24 citation statements)
references
References 38 publications
0
24
0
Order By: Relevance
“…Step 2: Generating the Chaotic Image Bob iterates the 2D Logistic map m × n times with x 0 , y 0 , r 1 , r 2 , s 1 , s 2 and then obtains two chaotic sequences X = {x i } mn and Y = {y i } mn . According to the element positions and Equations (16) and 17, he can convert c 1 i mn into a chaotic matrix C 1 m×n and c 2 i mn into a chaotic image C 2 m×n . Figure 5 is the image decryption flowchart.…”
Section: Bob's Decryption Processmentioning
confidence: 99%
See 3 more Smart Citations
“…Step 2: Generating the Chaotic Image Bob iterates the 2D Logistic map m × n times with x 0 , y 0 , r 1 , r 2 , s 1 , s 2 and then obtains two chaotic sequences X = {x i } mn and Y = {y i } mn . According to the element positions and Equations (16) and 17, he can convert c 1 i mn into a chaotic matrix C 1 m×n and c 2 i mn into a chaotic image C 2 m×n . Figure 5 is the image decryption flowchart.…”
Section: Bob's Decryption Processmentioning
confidence: 99%
“…Although the algorithms in References [9][10][11][12][13][14][15] are MIE algorithms, these MIE algorithms are designed with the features of optical images, which are not suitable for encrypting digital images. Therefore, this paper compares the proposed algorithm with the algorithms in References [7,8,[16][17][18][19][20][21].…”
Section: Existing Similar Algorithmsmentioning
confidence: 99%
See 2 more Smart Citations
“…This method has good performances in security and compression. Li et al [41] exploited two-dimensional DWT to decompose original images and conducted encryption in DWT domain by Arnold transform and robust chaotic map. This algorithm can convert four grayscale images with the same size into an encrypted image.…”
Section: Introductionmentioning
confidence: 99%