A chaotic image encryption scheme owning temp-value feedback
TLDR
This paper presents a single round permutation–diffusion chaotic cipher for gray image, in which some temp-value feedback mechanisms are introduced to resist the known attacks.About:
This article is published in Communications in Nonlinear Science and Numerical Simulation.The article was published on 2014-10-01 and is currently open access. It has received 112 citations till now. The article focuses on the topics: Plaintext & Ciphertext.read more
Citations
More filters
Journal ArticleDOI
Image encryption using 2D Logistic-adjusted-Sine map
Zhongyun Hua,Yicong Zhou +1 more
TL;DR: A two-dimensional Logistic-adjusted-Sine map (2D-LASM) is proposed that has better ergodicity and unpredictability, and a wider chaotic range than many existing chaotic maps.
Journal ArticleDOI
Image encryption based on three-dimensional bit matrix permutation
TL;DR: A new 3D bit matrix permutation is proposed, in which the Chen system is used to develop a random visiting mechanism to the bit level of the plain-image, and a new mapping rule is developed to map one random position to another random position in the 3D matrix rather than using traditional sequential visiting to theplain-image.
Journal ArticleDOI
Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms
TL;DR: A new chaos-based partial image encryption scheme based on Substitution-boxes (S-box) constructed by chaotic system and Linear Fractional Transform is proposed, which showed high performances and great potential for prominent prevalence in cryptographic applications.
Journal ArticleDOI
A Review of Compressive Sensing in Information Security Field
TL;DR: This paper reviews CS in information security field from two aspects: theoretical security and application security, and indicates some other possible application research topics in future.
Journal ArticleDOI
Sine Chaotification Model for Enhancing Chaos and Its Hardware Implementation
TL;DR: A sine chaotification model (SCM) is introduced as a general framework to enhance the chaos complexity of existing one-dimensional chaotic maps and it is proved that the three enhanced chaotic maps have more complicated dynamics behaviors than their seed chaotic maps.
References
More filters
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Book
Randomized Algorithms
TL;DR: This book introduces the basic concepts in the design and analysis of randomized algorithms and presents basic tools such as probability theory and probabilistic analysis that are frequently used in algorithmic applications.
Journal ArticleDOI
A symmetric image encryption scheme based on 3D chaotic cat maps
TL;DR: The two-dimensional chaotic cat map is generalized to 3D for designing a real-time secure symmetric encryption scheme that uses the 3D cat map to shuffle the positions of image pixels and uses another chaotic map to confuse the relationship between the cipher-image and the plain-image, thereby significantly increasing the resistance to statistical and differential attacks.
Journal ArticleDOI
Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
TL;DR: Methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes to encrypt an N×N image.
Journal ArticleDOI
Some basic cryptographic requirements for chaos-based cryptosystems
Gonzalo Alvarez,Shujun Li +1 more
TL;DR: The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements.