2020
DOI: 10.1007/978-981-15-1081-6_40
|View full text |Cite
|
Sign up to set email alerts
|

Synthetic Image and Strange Attractor: Two Folded Encryption Approach for Secure Image Communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…An image encryption method using Chen attractor and FPGA-generated synthetic images was described by Kumar and Yuvaraja. A synthetic picture was produced using an Altera Cyclone II FPGA, utilizing 438 logic components and 34.03 mW of power consumption [24].…”
Section: Logistic Mapmentioning
confidence: 99%
“…An image encryption method using Chen attractor and FPGA-generated synthetic images was described by Kumar and Yuvaraja. A synthetic picture was produced using an Altera Cyclone II FPGA, utilizing 438 logic components and 34.03 mW of power consumption [24].…”
Section: Logistic Mapmentioning
confidence: 99%
“…In contrast to the discrete chaotic maps, the systems governed by differential equations are called as dynamical systems with continuous time. They are called the chaotic system, which is characteristic of three or higher dimensions [34]. The systems are classified as chaotic if they possess at least one positive Lyapunov exponent, and hyper-chaotic if more than one positive Lyapunov exponent is exhibited [35].…”
Section: Classification Of Chaosmentioning
confidence: 99%
“…They produce a butterfly pattern when subjected to particular values of control parameters. The strange attractors which manifest chaos are used in image encryption [34,36].…”
Section: Classification Of Chaosmentioning
confidence: 99%