The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, great attention is paid to the use of chaotic maps in image encryption applications due to their excellent randomness properties. In this paper, an efficient image encryption algorithm using a set of chaotic maps has been proposed. The proposed algorithm consists of three stages: confusion, shuffling, and diffusion. In confusion stage, the original image is confused by using Arnold cat chaotic...
The paper presents an image encryption algorithm based on two-dimensional (2D) Logistic map and complicated Chua's system. Firstly it utilizes two chaotic sequences generated by 2D Logistic map to scramble a color image, and then uses the chaotic sequences generated by optimization models of Chua's system to produce new pixel values. The simulation results demonstrate that the algorithm has good properties...
A new encryption algorithm for color image is proposed. Firstly, scramble pixel during the colored digital lays. Secondly, use the chaos sequence that Logistic chaos mapping generates to obtain the scrambling address code of pixel, which can scramble pixel of each lay. Thirdly, the scrambled image is encrypted with the chaos image which is generated by Logistic chaos mapping through performing an...
Recently, a new block encryption system has been proposed based on iterating a logistic map. This paper studies the security of the new encryption scheme and reports the following findings: (1) the sub-keys of any ciphertext can be obtained by using only two chosen ciphertexts; (2) the underlying chaotic key stream sequence can be reconstructed as an equivalent key by some chosen plaintext and ciphertext...
A substitution-diffusion based image cipher using chaotic standard and logistic maps was proposed recently. However, the cipher can be broken with a simple method by using only one known plain and cipher image pair. The attacking process need not to be complex because of the two vital defects of the encryption algorithm. Suggestions for improving the security of the algorithm are also provided.
A security of an image encryption scheme based on improved chaotic cat maps was analyzed. In these analyses, it has revealed some rules of key information leaking in certain instances, and has pointed out that the algorithm is insensitive to both the control parameters and the changes of plaintext. In the condition of known-image attack, an equivalent key-solved algorithm about once iteration and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.