4.7 Article

Image encryption algorithm based on a 2D-CLSS hyperchaotic map using simultaneous permutation and diffusion

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Hardware & Architecture

Characteristic Analysis of 2D Lag-Complex Logistic Map and Its Application in Image Encryption

Fangfang Zhang et al.

Summary: The study proposes a novel 2D lag-complex logistic map with extensive chaotic intervals and good ergodicity. A color image cryptosystem based on this map is constructed, showing strong resistance to traditional cipher attacks.

IEEE MULTIMEDIA (2021)

Article Computer Science, Information Systems

A new fractional one dimensional chaotic map and its application in high-speed image encryption

Mohamed Zakariya Talhaoui et al.

Summary: A new fractional one-dimensional chaotic map with a large chaotic space and simple structure is proposed for real-time image encryption. The combination of substitution and permutation stages significantly increases the scheme's security and speed by modifying both pixel positions and values simultaneously. Simulation and experimental analysis confirm the high performance of the proposed scheme.

INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

Fractal sorting matrix and its application on chaotic image encryption

Yongjin Xian et al.

Summary: This article introduces a fractal sorting matrix (FSM) and a new global pixel diffusion method based on this matrix cluster for image encryption. Experimental results show that the algorithm is more efficient, secure, and demonstrates better resistance against various attacks compared to other methods.

INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

Cross-plane colour image encryption using a two-dimensional logistic tent modular map

Zhongyun Hua et al.

Summary: Chaotic systems are suitable for image encryption, but many existing algorithms have shortcomings. This study introduces a new colour image encryption algorithm, LTMM-CIEA, using a two-dimensional logistic tent modular map (2D-LTMM) with wide chaotic range. Simulation experiments show LTMM-CIEA outperforms other state-of-the-art algorithms in terms of security.

INFORMATION SCIENCES (2021)

Article Computer Science, Information Systems

A new color image encryption using 2D improved logistic coupling map

Chanil Pak et al.

Summary: This paper introduces a new image encryption algorithm based on 2D-ILCM, which shows better chaotic characteristics and robustness through experiments.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Engineering, Mechanical

Color image encryption using orthogonal Latin squares and a new 2D chaotic system

Zhongyun Hua et al.

Summary: In this study, a new color image encryption algorithm is proposed by introducing a two-dimensional chaotic system and orthogonal Latin squares, which fully considers the inherent connections between color images and Latin squares, achieving encryption at the pixel level.

NONLINEAR DYNAMICS (2021)

Article Mathematics, Interdisciplinary Applications

A Novel Lightweight Block Encryption Algorithm Based on Combined Chaotic S-Box

Tong Xiaojun et al.

Summary: This study introduces a combined chaotic map-based S-box and lightweight block encryption algorithm, showing improved cryptographic performance and meeting the requirements of lightweight algorithms.

INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS (2021)

Article Computer Science, Artificial Intelligence

Coverless real-time image information hiding based on image block matching and dense convolutional network

Yuanjing Luo et al.

JOURNAL OF REAL-TIME IMAGE PROCESSING (2020)

Article Mathematics, Interdisciplinary Applications

An Image Encryption Algorithm Based on Random Walk and Hyperchaotic Systems

Cong Xu et al.

INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS (2020)

Article Optics

A new color image encryption scheme based on 2DNLCML system and genetic operations

Ying-Qian Zhang et al.

OPTICS AND LASERS IN ENGINEERING (2020)

Article Telecommunications

A color image encryption algorithm based on 2D-CIMM chaotic map

Cengfei Chen et al.

China Communications (2020)

Article Computer Science, Information Systems

Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network

Xingyuan Wang et al.

INFORMATION SCIENCES (2020)

Article Engineering, Electrical & Electronic

Multimodal Transformer With Multi-View Visual Representation for Image Captioning

Jun Yu et al.

IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY (2020)

Article Computer Science, Artificial Intelligence

Robust Image Hashing with Tensor Decomposition

Zhenjun Tang et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2019)

Article Computer Science, Artificial Intelligence

A chaotic image encryption algorithm based on 3-D bit-plane permutation

Zhi-hua Gan et al.

NEURAL COMPUTING & APPLICATIONS (2019)

Article Engineering, Electrical & Electronic

A novel image encryption scheme based on an elliptic curve

Umar Hayat et al.

SIGNAL PROCESSING (2019)

Article Optics

Index-based permutation-diffusion in multiple-image encryption using DNA sequence

Rasul Enayatifar et al.

OPTICS AND LASERS IN ENGINEERING (2019)

Article Computer Science, Information Systems

Fast image encryption algorithm based on parallel computing system

Xingyuan Wang et al.

INFORMATION SCIENCES (2019)

Article Optics

A novel image steganography technique based on quantum substitution boxes

Ahmed A. Abd EL-Latif et al.

OPTICS AND LASER TECHNOLOGY (2019)

Article Engineering, Electrical & Electronic

Cryptanalyzing an image encryption based on a modified Henon map using hybrid chaotic shift transform

Kanglei Zhou et al.

DIGITAL SIGNAL PROCESSING (2019)

Article Optics

A fast image encryption algorithm based on compressive sensing and hyperchaotic map

Qiaoyun Xu et al.

OPTICS AND LASERS IN ENGINEERING (2019)

Article Computer Science, Information Systems

Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm

Chunpeng Wang et al.

INFORMATION SCIENCES (2019)

Article Computer Science, Information Systems

A proposed secure multiple watermarking technique based on DWT, DCT and SVD for application in medicine

Aditi Zear et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Computer Science, Information Systems

JPEG Image Encryption With Improved Format Compatibility and File Size Preservation

Junhui He et al.

IEEE TRANSACTIONS ON MULTIMEDIA (2018)

Article Computer Science, Information Systems

Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion

Mousa Farajallah et al.

MULTIMEDIA TOOLS AND APPLICATIONS (2018)

Article Engineering, Electrical & Electronic

2D Logistic-Sine-coupling map for image encryption

Zhongyun Hua et al.

SIGNAL PROCESSING (2018)

Article Engineering, Electrical & Electronic

Image encryption using 2D Henon-Sine map and DNA approach

Jiahui Wu et al.

SIGNAL PROCESSING (2018)

Article Engineering, Electrical & Electronic

Fragile image watermarking with pixel-wise recovery based on overlapping embedding strategy

Chuan Qin et al.

SIGNAL PROCESSING (2017)

Article Computer Science, Theory & Methods

Robust Image Hashing With Ring Partition and Invariant Vector Distance

Zhenjun Tang et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2016)

Article Optics

Multiple-image encryption with bit-plane decomposition and chaotic maps

Zhenjun Tang et al.

OPTICS AND LASERS IN ENGINEERING (2016)

Article Computer Science, Artificial Intelligence

Robust Perceptual Image Hashing Based on Ring Partition and NMF

Zhenjun Tang et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2014)

Article Computer Science, Information Systems

Numerical solution of systems of second-order boundary value problems using continuous genetic algorithm

Omar Abu Arqub et al.

INFORMATION SCIENCES (2014)

Article Mathematics, Applied

An Optimization Algorithm for Solving Systems of Singular Boundary Value Problems

Zaer Abo-Hammour et al.

APPLIED MATHEMATICS & INFORMATION SCIENCES (2014)

Article Mathematics, Applied

Solving Singular Two-Point Boundary Value Problems Using Continuous Genetic Algorithm

Omar Abu Arqub et al.

ABSTRACT AND APPLIED ANALYSIS (2012)