2013
DOI: 10.1002/sec.927
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric key image encryption using chaotic Rossler system

Abstract: In this article, an algorithm for encryption of digital image based on chaos theory is proposed. This encryption algorithm includes two main operations of image element shuffling and pixel replacement. The analysis of cryptographic strength (resistance attack) has been performed to confirm the fact. The results of several experimental tests, such as key space analysis, key sensitivity analysis, and statistical analysis, show that the proposed algorithm for image cryptosystems provides an efficient and secure w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(20 citation statements)
references
References 20 publications
0
20
0
Order By: Relevance
“…The three-dimensional chaotic Rössler system [18] is used for image encryption. It can be described as Equation (1).…”
Section: Chaotic Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…The three-dimensional chaotic Rössler system [18] is used for image encryption. It can be described as Equation (1).…”
Section: Chaotic Systemmentioning
confidence: 99%
“…In [13,14], another scheme is proposed to verify the randomness of the image, called "Shannon's local entropy." We also use Shannon local entropy analysis to validate our purposed scheme [15][16][17][18][19][20][21][22][23][24][25][26][27].The rest of the paper is organized as follows. Section 2 presents our designed four-dimensional chaotic system and proposed image encryption scheme.…”
mentioning
confidence: 99%
“…Chaotic maps are deterministic dynamical systems that have random-like behavior, sensitivity to slight changes in initial parameters, ergodicity, diffusion, and confusion characteristics. These qualities are analogous to requirements in cryptographic algorithms; thus chaotic maps have been used to design hash functions [11], encryption algorithms [12], key exchange protocols [13], and digital signature schemes [14]. Authenticated image encryption schemes based on chaos have been introduced by Bakhshandeh and Eslami [15] as well as Yang et al [16].…”
Section: Chaotic Mapsmentioning
confidence: 99%
“…Normally, strong correlation exists in any natural meaningful plain‐image. A good encryption scheme should reduce greatly the correlation coefficients to near zeros . By selecting randomly some pairs of adjacent pixels from three directions, that is, horizontally, vertically, and diagonally, the results are listed in Table according to the equation .…”
Section: Security Analysesmentioning
confidence: 99%