A number of image encryption schemes based upon chaotic systems proposed in the past, have been found to be vulnerable to known-plaintext attack due to the usage of simple linear mapping functions, predictable trajectories etc. In this paper, we propose a hybrid scheme based upon Logistic-Cosine-Sine chaos system and Elliptic Curve Cryptography. The complex chaos mapping function shall result in uniformly distributed pseudo-random outputs and a wider dynamic range while as the Elliptic Curve based cryptography shall be used to leverage the computationally secure encryption of the image pixels. Simulation of the proposed algorithm has been carried using 512-bit standard Elliptic curve given by ECC Brainpool. Results, security analysis reveal...
In this paper, an implementation of digital image encryption scheme based on one dimensional logisti...
Information security and privacy are of utmost importance in transmitting, storing and preserving me...
During the last two decades various chaotic image encryption algorithms have been proposed, but most...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
The chaos based cryptographic algorithms have suggested several advantages over the traditional encr...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
Existing hyperchaotic systems suffer from a small parameter range and small key space. Therefore, we...
This paper proposes an image encryption technique using three stages algorithms based on hyper-chaot...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
This paper deals with a plaintext-related image encryption algorithm that modifies the parameter val...
A novel symmetric cryptosystem of the substitution permutation network type is presented for image e...
In this paper, an efficient chaos-based image encryption scheme for color images is proposed. This p...
In the following paper, the novel method for color image encryption has proposed based on high level...
In this paper, an implementation of digital image encryption scheme based on one dimensional logisti...
Information security and privacy are of utmost importance in transmitting, storing and preserving me...
During the last two decades various chaotic image encryption algorithms have been proposed, but most...
Image encryption based on chaotic maps is an important method for ensuring the secure communication ...
In the recent world, security is a prime important issue, and encryption is one of the best alternat...
The chaos based cryptographic algorithms have suggested several advantages over the traditional encr...
In the existing literature, numerous chaos-based multimedia encryption schemes have been presented. ...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
Existing hyperchaotic systems suffer from a small parameter range and small key space. Therefore, we...
This paper proposes an image encryption technique using three stages algorithms based on hyper-chaot...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
This paper deals with a plaintext-related image encryption algorithm that modifies the parameter val...
A novel symmetric cryptosystem of the substitution permutation network type is presented for image e...
In this paper, an efficient chaos-based image encryption scheme for color images is proposed. This p...
In the following paper, the novel method for color image encryption has proposed based on high level...
In this paper, an implementation of digital image encryption scheme based on one dimensional logisti...
Information security and privacy are of utmost importance in transmitting, storing and preserving me...
During the last two decades various chaotic image encryption algorithms have been proposed, but most...