Color image encryption based on one-time keys and robust chaotic maps

Computers & Mathematics with Applications - Tập 59 - Trang 3320-3327 - 2010
Hongjun Liu1,2, Xingyuan Wang1
1Department of Electronic and Information Engineering, Dalian University of Technology, Dalian 116024, China
2Weifang Vocational College, Weifang 261041, China

Tài liệu tham khảo

Schneier, 1996 Daemen, 2002 Chen, 2004, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons & Fractals, 21, 749, 10.1016/j.chaos.2003.12.022 Alvarez, 1999, New approach to chaotic encryption, Physics Letters A, 263, 373, 10.1016/S0375-9601(99)00747-1 Li, 2007, A stream cipher based on a spatiotemporal chaotic system, Chaos, Solitons & Fractals, 32, 1867, 10.1016/j.chaos.2005.12.021 Baptista, 1998, Cryptography with chaos, Physics Letters A, 240, 50, 10.1016/S0375-9601(98)00086-3 Xiang, 2006, A novel block cryptosystem based on iterating a chaotic map, Physics Letters A, 349, 109, 10.1016/j.physleta.2005.02.083 Wu, 2004, Parameter estimation only from the symbolic sequences generated by chaos system, Chaos, Solitons & Fractals, 22, 359, 10.1016/j.chaos.2004.02.008 Stinson, 1995 Pisarchik, 2008, Image encryption with chaotically coupled chaotic maps, Physica D, 237, 2638, 10.1016/j.physd.2008.03.049 Wang, 2009, Cryptanalysis and improvement on a cryptosystem based on a chaotic map, Computers and Mathematics with Applications, 57, 476, 10.1016/j.camwa.2008.09.042 Hu, 2009, A true random number generator based on mouse movement and chaotic cryptography, Chaos, Solitons & Fractals, 40, 2286, 10.1016/j.chaos.2007.10.022 Shanon, 1949, Communication theory of secrecy systems, Bell System Technical Journal, 28, 656, 10.1002/j.1538-7305.1949.tb00928.x Amigoa, 2007, Theory and practice of chaotic cryptography, Physics Letters A, 366, 211, 10.1016/j.physleta.2007.02.021 Thompson, 2005, MD5 collisions and the impact on computer forensics, Digital Investigation, 2, 36, 10.1016/j.diin.2005.01.004 Cid, 2006, Recent developments in cryptographic hash functions: security implications and future directions, Information Security Technical Report, 11, 100, 10.1016/j.istr.2006.03.007 Pareek, 2006, Image encryption using chaotic logistic map, Image and Vision Computing, 24, 926, 10.1016/j.imavis.2006.02.021 Rhouma, 2009, OCML-based colour image encryption, Chaos, Solitons & Fractals, 40, 309, 10.1016/j.chaos.2007.07.083 Zhang, 2008, Cryptanalysis of the public key encryption based on multiple chaotic systems, Chaos, Solitons & Fractals, 37, 669, 10.1016/j.chaos.2006.09.047