Image encryption using chaotic logistic map
Citations
528 citations
503 citations
490 citations
Cites methods from "Image encryption using chaotic logi..."
...Algorithm 1 uses a logistic map and a two-value threshold function to generate the 0–1 stream [17]....
[...]
485 citations
Additional excerpts
...2005 Published by Elsevier Ltd....
[...]
476 citations
Cites background from "Image encryption using chaotic logi..."
...not good for image data either for a low encryption eciency [39] or a relatively small block size for encryption. Many image ciphers have been researced, including chaotic system based image ciphers [7, 10, 13, 15, 18, 19, 23, 25, 27, 35, 36, 41, 42], SCAN language based algorithms [11, 12], transform based algorithms [24, 31, 38] and others [22]. On the other hand, the distinctive characteristics of image data implies that the randomness tests d...
[...]
References
2,361 citations
"Image encryption using chaotic logi..." refers background in this paper
...During the last decade, numerous encryption algorithms [1–13] have been proposed in the literature based on different principles....
[...]
1,904 citations
1,654 citations
"Image encryption using chaotic logi..." refers methods in this paper
...Fridrich [ 4 ] demonstrated the construction of a symmetric block encryption technique based on two-dimensional standard baker map....
[...]
...There are three basic steps in the method of Fridrich [ 4 ]: (a) choose a chaotic map and generalize it by introducing some parameter, (b) discretize the chaotic map to a finite square lattice of points that represent pixels, (c) extend the discretized map to three-dimensions and further compose it with a simple diffusion mechanism....
[...]
612 citations
294 citations
"Image encryption using chaotic logi..." refers background in this paper
...Later in 2002, Li and Zheng [11] pointed out some defects in the encryption schemes presented in the references [6,9] and also discussed some possible improvements on them....
[...]