A secure image encryption scheme based on cellular automata and chaotic skew tent map

Journal of Information Security and Applications - Tập 45 - Trang 117-130 - 2019
Bhaskar Mondal1, Shrey Singh2, Prabhakar Kumar2
1Xavier School of Computer Science and Engineering, Xavier University Bhubaneshwar, Orissa, 752050, India
2Department of Computer Science and Engineering, National Institute of Technology Jamshedpur Jamshedpur, Jharkhand, 831014, India

Tài liệu tham khảo

Wong, 2008, A fast image encryption scheme based on chaotic standard map, Phys Lett A, 372, 2645, 10.1016/j.physleta.2007.12.026

Chen, 2014, A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme, Optik, 125, 2472, 10.1016/j.ijleo.2013.12.001

Jolfaei, 2016, On the security of permutation-only image encryption schemes, IEEE Trans Inf Forensics Secur, 11, 235, 10.1109/TIFS.2015.2489178

Premkumar, 2018, Secured and compound 3-d chaos image encryption using hybrid mutation and crossover operator, Multimed Tools Appl, 10.1007/s11042-018-6534-z

Mozaffari, 2018, Parallel image encryption with bitplane decomposition and genetic algorithm, Multimed Tools Appl, 77, 25799, 10.1007/s11042-018-5817-8

Li, 2017, A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation, Opt Lasers Eng, 90, 238, 10.1016/j.optlaseng.2016.10.020

Wang, 2009, A block encryption algorithm based on dynamic sequences of multiple chaotic systems, Commun Nonlinear Sci Numer Simul, 14, 574, 10.1016/j.cnsns.2007.10.011

Li, 2012, Breaking a novel colour image encryption algorithm based on chaos, Nonlinear Dyn, 70, 2383, 10.1007/s11071-012-0626-5

Li, 2016, Chaotic image encryption using pseudo-random masks and pixel mapping, Sig Process, 125, 48, 10.1016/j.sigpro.2015.11.017

Jin, 2012, An image encryption based on elementary cellular automata, Opt Lasers Eng, 50, 1836, 10.1016/j.optlaseng.2012.06.002

Mitchell, 2005, 95

Siegenthaler, 1984, Correlation-immunity of nonlinear combining functions for cryptographic applications (corresp.), IEEE Trans Inf Theory, 30, 776, 10.1109/TIT.1984.1056949

Sutton, 2009

Wu, 2011, NPCR and UACI randomness tests for image encryption, cyber journals: multidisciplinary journals in science and technology, J Sel Areas Telecommun, 1

Dodis, 2004

Shannon, 1949, Communication theory of secrecy systems, Bell Syst Tech J, 28, 656715, 10.1002/j.1538-7305.1949.tb00928.x