The chaos based cryptographic algorithms have suggested several advantages over the traditional encryption algo-rithms such as high security, speed, reasonable computa-tional overheads and computational power. This paper introduces an efficient chaos-based stream cipher, com-posing two chaotic logistic maps and a large enough exter-nal secret key for image encryption. The external secret key is used to derive the initial conditions for the chaotic maps, and is employed with the two chaotic maps to con-fuse the relationship between the cipher image and the plain image. In the encryption phase, the pixels are en-crypted using an iterative cipher module based feedback and data-dependent inputs mechanism for mixing the cur-rent encryption param...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
Chaos systems have been widely used in image encryption algorithms. In this article, we introduce an...
The proposed chaos-based image encryption algorithm consists of four stages: decomposition, shuffle,...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
Nowadays, image information is routinelyused in many applications. This paper presentscomparative st...
In this paper, an implementation of digital image encryption scheme based on one dimensional logisti...
<p class="KeywordsHeader"><span>A novel and robust chaos-based digital image encryption is proposed....
Abstract With the development of information technology, image information has become the main conte...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
During the recent years several chaotic image encryption algorithms based on one dimensional (1-D) h...
A chaotic system refers to a deterministic system with seemingly random irregular motion, and its be...
Abstract: In recent years, the chaos based cryptographic algorithms have suggested some new and effi...
A new image encryption scheme based on high dimensional compound chaotic systems is proposed in this...
In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
Chaos systems have been widely used in image encryption algorithms. In this article, we introduce an...
The proposed chaos-based image encryption algorithm consists of four stages: decomposition, shuffle,...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
Nowadays, image information is routinelyused in many applications. This paper presentscomparative st...
In this paper, an implementation of digital image encryption scheme based on one dimensional logisti...
<p class="KeywordsHeader"><span>A novel and robust chaos-based digital image encryption is proposed....
Abstract With the development of information technology, image information has become the main conte...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
During the recent years several chaotic image encryption algorithms based on one dimensional (1-D) h...
A chaotic system refers to a deterministic system with seemingly random irregular motion, and its be...
Abstract: In recent years, the chaos based cryptographic algorithms have suggested some new and effi...
A new image encryption scheme based on high dimensional compound chaotic systems is proposed in this...
In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
Chaos systems have been widely used in image encryption algorithms. In this article, we introduce an...
The proposed chaos-based image encryption algorithm consists of four stages: decomposition, shuffle,...