2023
DOI: 10.1007/s11071-022-08158-z
|View full text |Cite
|
Sign up to set email alerts
|

Triple-image bit-level encryption algorithm based on double cross 2D hyperchaotic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 50 publications
0
11
0
Order By: Relevance
“…For one iteration cycle, the suggested scheme's key space value ≈2 540 is obtained. The traditional algorithm [13,16,18,23,24,25,26] has lower key space, and schemes [17,27] have larger key space values than the proposed algorithms. The scheme [13,16,17,18,23,24,25,26] has achieved its optimal key space value of 2 100 after several rounds of iteration, whereas the proposed Scheme 1 and Scheme 2 have attained their ideal values for a one cycle of iteration itself.…”
Section: Brute Force Attackmentioning
confidence: 98%
“…For one iteration cycle, the suggested scheme's key space value ≈2 540 is obtained. The traditional algorithm [13,16,18,23,24,25,26] has lower key space, and schemes [17,27] have larger key space values than the proposed algorithms. The scheme [13,16,17,18,23,24,25,26] has achieved its optimal key space value of 2 100 after several rounds of iteration, whereas the proposed Scheme 1 and Scheme 2 have attained their ideal values for a one cycle of iteration itself.…”
Section: Brute Force Attackmentioning
confidence: 98%
“…Consequently, the global search capability of the algorithm is enhanced, and the convergence speed is accelerated. The ICMIC chaotic mapping employed in this study is characterized by infinite folding times [49,50], making it more likely to exhibit chaotic phenomena compared to other maps with limited folding times. The mathematical expression for the ICMIC chaotic mapping is as follows:…”
Section: Icmic Chaotic Mappingmentioning
confidence: 99%
“…Image transformation has a high degree of data redundancy. To prevent an attacker from analyzing the correlation of the adjacent pixels, the cipher image pixels should be as uncorrelated as possible [54]. That is, the coefficient should be close to the ideal value of 0.…”
Section: Correlation Of Adjacent Pixelsmentioning
confidence: 99%