2015
DOI: 10.1007/s11071-015-2258-z
|View full text |Cite
|
Sign up to set email alerts
|

Real-time image encryption using a low-complexity discrete 3D dual chaotic cipher

Abstract: In this paper, an algorithm is proposed for real-time image encryption. This scheme employs a dual chaotic generator based on a three-dimensional discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the image data are injected into the dynamics of a master chaotic generator. The second generator is used to permute the dynamics of the master generator using the same approach. Since the image data can be regarded as a random source, the resulting permutations of the generator d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(13 citation statements)
references
References 41 publications
0
13
0
Order By: Relevance
“…The Key that are used on with 3D Lorenz are the initial values for the three state variables, the and , the parameters and , and for each of the state equations. As shown in [25], the key length is 39 decimal digits, with a key space of 10 39 . The order of the tensor product can be used as an additional key, which has 18 combinations (which will be introduced in detail in “Key sensitivity”).…”
Section: Numerical Simulation Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The Key that are used on with 3D Lorenz are the initial values for the three state variables, the and , the parameters and , and for each of the state equations. As shown in [25], the key length is 39 decimal digits, with a key space of 10 39 . The order of the tensor product can be used as an additional key, which has 18 combinations (which will be introduced in detail in “Key sensitivity”).…”
Section: Numerical Simulation Resultsmentioning
confidence: 99%
“…Although the attackers have access to some plaintext-ciphertext pair, they will be unable to reproduce the system without knowledge of the order of tensor product. Furthermore, the 3D Lorenz, which was introduced in the system, has the ability to withstand these common attacks [25, 26]. Therefore, the proposed system based on TCS with 3D Lorenz has the ability to resist these common attacks.…”
Section: Numerical Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Ye et al [11] put forward an efficient symmetric image encryption algorithm based on an intertwining Logistic map. Haroun [12] came up with a real-time image encryption scheme using a low-complexity discrete 3D dual chaotic cipher.…”
Section: Introductionmentioning
confidence: 99%