The popularization of 5G and the development of cloud computing further promote the application of images. The storage of images in an untrusted environment has a great risk of privacy leakage. This paper outlines a design for a lightweight image encryption algorithm based on a message-passing algorithm with a chaotic external message. The message-passing (MP) algorithm allows simple messages to be passed locally for the solution to a global problem, which causes the interaction among adjacent pixels without additional space cost. This chaotic system can generate high pseudorandom sequences with high speed performance. A two-dimensional logistic map is utilized as a pseudorandom sequence generator to yield the external message sets of edge ...
Chaotic-maps-based image encryption methods have been a topic of research interest for a decade. How...
The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited key s...
This paper deals with a plaintext-related image encryption algorithm that modifies the parameter val...
At the present time, the increase of data transmission over various networks in a wide range, which ...
Data transmission over the Internet and the personal network has been risen day by day due to the ad...
Due to social networks, demand for sharing multimedia data is significantly increased in last decade...
International audienceThe protection of multimedia content has become a key area of research, since ...
The chaos based cryptographic algorithms have suggested several advantages over the traditional encr...
In this paper, a chaos-based image encryption algorithm was proposed. It consists of four stages: de...
This paper proposes an effective chaos-based encryption algorithm specialised for images. A system o...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
Abstract:- The image encryption is widely used to secure transmission of data in an open internet an...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption ...
Chaotic-maps-based image encryption methods have been a topic of research interest for a decade. How...
The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited key s...
This paper deals with a plaintext-related image encryption algorithm that modifies the parameter val...
At the present time, the increase of data transmission over various networks in a wide range, which ...
Data transmission over the Internet and the personal network has been risen day by day due to the ad...
Due to social networks, demand for sharing multimedia data is significantly increased in last decade...
International audienceThe protection of multimedia content has become a key area of research, since ...
The chaos based cryptographic algorithms have suggested several advantages over the traditional encr...
In this paper, a chaos-based image encryption algorithm was proposed. It consists of four stages: de...
This paper proposes an effective chaos-based encryption algorithm specialised for images. A system o...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
Abstract:- The image encryption is widely used to secure transmission of data in an open internet an...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption ...
Chaotic-maps-based image encryption methods have been a topic of research interest for a decade. How...
The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited key s...
This paper deals with a plaintext-related image encryption algorithm that modifies the parameter val...