2018
DOI: 10.1007/978-3-030-01177-2_56
|View full text |Cite
|
Sign up to set email alerts
|

Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…Reference [21] Reference [36] Reference [37] Reference [38] Figure 8: e bar chart of the PSNR. [11] 99.60 33.48 Reference [17] 99.6395 33.3992…”
Section: Oursmentioning
confidence: 99%
“…Reference [21] Reference [36] Reference [37] Reference [38] Figure 8: e bar chart of the PSNR. [11] 99.60 33.48 Reference [17] 99.6395 33.3992…”
Section: Oursmentioning
confidence: 99%
“…[3,5,25,26,27,28], ours has the smallest correlation values in all directions therefore, the proposed cryptosystem protects the images against statistical attacks. In addition to the fact that the cryptosystem owns a key space suitable to resist to the brute force attack, also, the cryptosystem must be very sensitive to their keys [34][35], where even there is only a tenuous variance of 10 −15 between the encryption and decryption keys leads to failure of decryption. To evaluate the sensibility of key of our proposed algorithm, we decrypt Lena image with tenuous variance in any of the parameters of the secret key, the results are shown in Figure 10.…”
Section: The Correlation Coefficientsmentioning
confidence: 99%
“…Various cryptographic applications have adopted digital chaos in their designs such as image encryption [1]- [6], S-box [7], [8], image watermarking [9], [10], pseudo-random number generators [11], [12], security protocols [13], [14], and hash function [15]- [17]. There are also other chaos-based applications that have been proposed such as secure speech encryption based on chaotic map [18], image encryption [19], and chaos-based compressive sensing encryption [20].…”
Section: Introductionmentioning
confidence: 99%