In the following paper, the novel method for color image encryption has proposed based on high level chaotic maps . We introduced two novel chaotic maps BCosinus-Arcsinus (CA)^ and BSinus-Power Logistic (SPL)^, which have better chaotic behaviour against other available chaotic maps. Our scheme like other image encryption schemes has two main phases, which are pixel shuffling and pixel diffusion. We made an efficient chaotic permutation method, which is extremely dependent on plain image. The proposed method compared with other availabale permutation methods in pixel shuffling stage has a better performance with a lower computational overhead. Another advantage of our permutation method is less correla- tion between adjacent pixels in the p...
Abstract: This paper introduces a simple and effective improved one-dimension (1D) Logistic chaotic ...
This paper aims to present a parallel implementation-based color image encryption using non -linear ...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
In this paper, an efficient chaos-based image encryption scheme for color images is proposed. This p...
This paper proposes an image encryption technique using three stages algorithms based on hyper-chaot...
Low-dimensional chaotic mappings are simple functions that have low computation cost and are easy to...
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption ...
Image encryption field has motivated many researchers, recently and too many studies held by them. W...
This paper suggests a new chaos-based color image cipher with an efficient substitution keystream ge...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
In this paper, we propose to enhance the security performance of the color image encryption algorith...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
Based on complex Chen and complex Lorenz systems, a novel color image encryption algorithm is propos...
During the last two decades various chaotic image encryption algorithms have been proposed, but most...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
Abstract: This paper introduces a simple and effective improved one-dimension (1D) Logistic chaotic ...
This paper aims to present a parallel implementation-based color image encryption using non -linear ...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
In this paper, an efficient chaos-based image encryption scheme for color images is proposed. This p...
This paper proposes an image encryption technique using three stages algorithms based on hyper-chaot...
Low-dimensional chaotic mappings are simple functions that have low computation cost and are easy to...
Several chaos-based image encryption schemes have been proposed in the last decade. Each encryption ...
Image encryption field has motivated many researchers, recently and too many studies held by them. W...
This paper suggests a new chaos-based color image cipher with an efficient substitution keystream ge...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
In this paper, we propose to enhance the security performance of the color image encryption algorith...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
Based on complex Chen and complex Lorenz systems, a novel color image encryption algorithm is propos...
During the last two decades various chaotic image encryption algorithms have been proposed, but most...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
Abstract: This paper introduces a simple and effective improved one-dimension (1D) Logistic chaotic ...
This paper aims to present a parallel implementation-based color image encryption using non -linear ...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...