2020
DOI: 10.1109/access.2020.3001949
|View full text |Cite
|
Sign up to set email alerts
|

Novel Image Encryption Using a Pseudoset Generated by Chaotic Permutation Multicircular Shrinking With a Gradual Deletion of the Input Set

Abstract: High-level security with a large keyspace and a short processing time is needed in digital image encryption. Generally, an encryption method that produces a large keyspace is characterized by a relatively slow encryption process. In this paper, we propose a new image encryption method that uses two chaotic pseudosets. A gradual deletion of the input set (GDIS) is introduced to enhance the process of chaotic permutation multicircular shrinking (CPMCS), herein referred to as GDIS CPMCS, to diffuse the image pixe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 47 publications
0
6
0
Order By: Relevance
“…For the test, the base key is generated using the PCMP Expanded Key Generator function with the input parameters of N=100, Initial Key = 12345678 and Sequence Key = 1234. The resulting base key contains the set of values: {12, 28, 14, 70, 53, 66, 79, 92, 13,27,41,77,69,83,11,26,41,72,71,32,49,49,1,17,33,49,65,66,25,27,59,7,25,28,61,14,33,52,9,14,49,54,31,52,17,39,7,15,1,25,49,10,37,12,41,22,5,30,19,4,37,28,21,13,13,…”
Section: A Pair Key Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…For the test, the base key is generated using the PCMP Expanded Key Generator function with the input parameters of N=100, Initial Key = 12345678 and Sequence Key = 1234. The resulting base key contains the set of values: {12, 28, 14, 70, 53, 66, 79, 92, 13,27,41,77,69,83,11,26,41,72,71,32,49,49,1,17,33,49,65,66,25,27,59,7,25,28,61,14,33,52,9,14,49,54,31,52,17,39,7,15,1,25,49,10,37,12,41,22,5,30,19,4,37,28,21,13,13,…”
Section: A Pair Key Generationmentioning
confidence: 99%
“…CPMC algorithm applies rotational shift of a set elements, using a key generated with special modulus and LCM rules towards a set of natural number sequences to produce chaotic properties. CPMC algorithm has been implemented for image encryption [20][21][22] and audio [23], however both implementations are limited to symmetric block cipher algorithm. This study proposes an asymmetric key cryptography implementation of the CPMC technique, by designing an algorithm that can generate a key pair from the CPMC encryption key.…”
Section: Introductionmentioning
confidence: 99%
“…That is, the mean of three sequences is calculated and defined as the new sequence C. Then, the sequence C is quantified according to Equation (5). The quantized data is constructed as a diffusion matrix DM, whose size is M × N. The XOR operations are performed on it and the three components of the scrambled image SI, respectively.…”
Section: Diffusionmentioning
confidence: 99%
“…Moreover, the chaos-based algorithms show outstanding characteristics in terms of security, complexity, speed, and computing power [3,4]. In recent years, the research of chaotic cryptography on image encryption has received a lot of attention from scholars [5][6][7][8][9]. For instance, on the basis of the permutation-substitution, an image encryption algorithm is presented in [10].…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, the research of chaotic cryptography on image encryption has also attracted the attention of many scholars [5][6][7][8][9][10][11] . For instance, a novel image encryption approach based on the "permutation-substitution" network and the chaotic system is proposed in Ref.…”
Section: Introductionmentioning
confidence: 99%