Image encryption is an important and effective technique to protect image security. In this paper, a novel image encryption algorithm combining Julia sets and Hilbert curves is proposed. The algorithm utilizes Julia sets ’ parameters to generate a random sequence as the initial keys and gets the final encryption keys by scrambling the initial keys through the Hilbert curve. The final cipher image is obtained by modulo arithmetic and diffuse operation. In this method, it needs only a few parameters for the key generation, which greatly reduces the storage space. Moreover, because of the Julia sets ’ properties, such as infiniteness and chaotic characteristics, the keys have high sensitivity even to a tiny perturbation. The experimental resul...
This paper studies the security of a recently-proposed image encryption scheme based on chaos, and p...
Wang and Guo (Nonlinear Dyn 76(4):1943–1950, 2014) proposed a new image alternate encryption algorit...
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption ...
Chaotic systems, especially hyper-chaotic systems are suitable for digital image encryption because ...
A novel symmetric cryptosystem of the substitution permutation network type is presented for image e...
A number of image encryption schemes based upon chaotic systems proposed in the past, have been foun...
An increasing demand of secure data transmission over internet leads to the challenge of implementin...
Image encryption based on elliptic curve cryptosystem and reducing its complexity is still being act...
AbstractThe enlarged size of the internet and vast communication across it and also medical needs di...
We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and...
In the following paper, the novel method for color image encryption has proposed based on high level...
This paper proposes an image encryption technique using three stages algorithms based on hyper-chaot...
It is well known that encryption algorithms developed based on Logistic map suffer from limited key ...
Abstract:- In this paper we design a new practical computer algorithm based on chaotic map lattices ...
In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has ...
This paper studies the security of a recently-proposed image encryption scheme based on chaos, and p...
Wang and Guo (Nonlinear Dyn 76(4):1943–1950, 2014) proposed a new image alternate encryption algorit...
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption ...
Chaotic systems, especially hyper-chaotic systems are suitable for digital image encryption because ...
A novel symmetric cryptosystem of the substitution permutation network type is presented for image e...
A number of image encryption schemes based upon chaotic systems proposed in the past, have been foun...
An increasing demand of secure data transmission over internet leads to the challenge of implementin...
Image encryption based on elliptic curve cryptosystem and reducing its complexity is still being act...
AbstractThe enlarged size of the internet and vast communication across it and also medical needs di...
We have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and...
In the following paper, the novel method for color image encryption has proposed based on high level...
This paper proposes an image encryption technique using three stages algorithms based on hyper-chaot...
It is well known that encryption algorithms developed based on Logistic map suffer from limited key ...
Abstract:- In this paper we design a new practical computer algorithm based on chaotic map lattices ...
In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has ...
This paper studies the security of a recently-proposed image encryption scheme based on chaos, and p...
Wang and Guo (Nonlinear Dyn 76(4):1943–1950, 2014) proposed a new image alternate encryption algorit...
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption ...