2023
DOI: 10.32604/csse.2023.034185
|View full text |Cite
|
Sign up to set email alerts
|

Remote Sensing Image Encryption Using Optimal Key Generation-Based Chaotic Encryption

Abstract: The Internet of Things (IoT) offers a new era of connectivity, which goes beyond laptops and smart connected devices for connected vehicles, smart homes, smart cities, and connected healthcare. The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users. With the increasing use of multimedia in communications, the content security of remote-sensing images attracted much attention in academia and industry. Image encryption is important for securing remote sensin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…where the interval of r is [1,4]. Bifurcation diagrams provide a convenient way to analyze the dynamics of chaotic mappings.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…where the interval of r is [1,4]. Bifurcation diagrams provide a convenient way to analyze the dynamics of chaotic mappings.…”
Section: Related Workmentioning
confidence: 99%
“…A 384-bit (16character) key is used to obtain the initial values of the CLSS and Chen chaos functions. An immune algorithm is used in the diffusion phase to optimize the parameter P of the CLSS hyperchaotic function, which takes values in the range [1,4], retaining four decimal places. The key space is therefore equal to 2 384 + 3 × 10 4 ≈ 2 384 , which is obviously greater than 2 100 [33], which is more than enough to withstand brute-force attacks.…”
Section: Information Entropy Analysismentioning
confidence: 99%
See 1 more Smart Citation