2005
DOI: 10.1016/j.physleta.2005.05.040
|View full text |Cite
|
Sign up to set email alerts
|

On the security of 3D Cat map based symmetric image encryption scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
58
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 145 publications
(58 citation statements)
references
References 15 publications
0
58
0
Order By: Relevance
“…The algorithm employed nonlinear functions, such as tangent function and power function with improved larger key space and high-level security. Many encryption algorithms have been proposed that use chaotic maps for encryption as their basic tool [13][14][15][16][17][18], as chaos based methods provide strong encryption strength, better statistical characteristics, and security.…”
Section: Related Workmentioning
confidence: 99%
“…The algorithm employed nonlinear functions, such as tangent function and power function with improved larger key space and high-level security. Many encryption algorithms have been proposed that use chaotic maps for encryption as their basic tool [13][14][15][16][17][18], as chaos based methods provide strong encryption strength, better statistical characteristics, and security.…”
Section: Related Workmentioning
confidence: 99%
“…Then, perform the byte swapping operation for the following 32 values of (i, j, l) one after another: (0,8,4), (1,9,5), (2,10,6), (3,11,7), (4,12,8), (5,13,9), (6,14,10), (7,15,11), (0,4,12), (1,5,13), (2,6,14), (3,7,15), (8,12,16), (9,13,17), (10,14,18), (11,15,19), (0,2,20), (1,3,21), (4,6,22), (5,7,23), (8,…”
Section: Multimedia Cryptography System (Mcs)mentioning
confidence: 99%
“…Due to the subtle similarity between chaos and cryptography, some of multimedia encryption schemes were designed based on one or more chaotic systems [3,4,5,8,9,11]. Meanwhile, a lot of cryptanalytic work has also been reported, showing that many encryption schemes were not designed carefully and are prone to various kinds of attacks [12,13,14,15,16,17,18,19,20,21,22,23].…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, traditional encryptions methods like IDEA, AES, DES, and RSA have limitation in encrypting image such as low efficiency, bulky data, and high correlation among pixels [2][3][4][5][6]. To face these challenges, a wide variety of cryptographic protocols have been proposed in the literature [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25]. In the last decade, chaos-based encryption techniques are considered suitable for practical applications since they have good combination of speed, high security, complexity, reasonable computational overheads, and computational power.…”
Section: Introductionmentioning
confidence: 99%