A secure and robust image encryption based on chaotic permutation multiple circular shrinking and expanding

被引:0
|
作者
机构
[1] Suryanto, Yohan
[2] Suryadi
[3] Ramli, Kalamullah
来源
| 1600年 / Ubiquitous International卷 / 07期
关键词
35;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] An image encryption scheme based on constructing large permutation with chaotic sequence
    Zhang, Xuanping
    Shao, Liping
    Zhao, Zhongmeng
    Liang, Zhigang
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (03) : 931 - 941
  • [22] Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption
    Loan, Nazir A.
    Hurrah, Nasir N.
    Parah, Shabir A.
    Lee, Jong Weon
    Sheikh, Javaid A.
    Bhat, G. Mohiuddin
    IEEE ACCESS, 2018, 6 : 19876 - 19897
  • [23] Digital Image Encryption Based on Chaotic Map for Secure Transmission
    Ahmad, Musheer
    Gupta, Chanki
    Varshney, Ankit
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES, 2009, : 292 - 295
  • [24] Image Encryption Based on Logistic Chaotic Map for Secure Communications
    Rodriguez-Sahagun, M. T.
    Mercado-Sanchez, J. B.
    Lopez-Mancilla, D.
    Jaimes-Reategui, R.
    Garcia-Lopez, J. H.
    2010 IEEE ELECTRONICS, ROBOTICS AND AUTOMOTIVE MECHANICS CONFERENCE (CERMA 2010), 2010, : 319 - 324
  • [25] Multiple-Image Encryption Algorithm Based on the 3D Permutation Model and Chaotic System
    Zhang, Xiaoqiang
    Wang, Xuesong
    SYMMETRY-BASEL, 2018, 10 (11):
  • [26] Visually secure multiple image encryption scheme based on the newly chaotic map and compressed sensing
    Wang, Yi-Fan
    Qin, Xiao-Li
    Tian, Yan-Zhao
    PHYSICA SCRIPTA, 2025, 100 (03)
  • [27] Secure image encryption scheme based on a new robust chaotic map and strong S-box
    Zhu, Shenli
    Deng, Xiaoheng
    Zhang, Wendong
    Zhu, Congxu
    MATHEMATICS AND COMPUTERS IN SIMULATION, 2023, 207 : 322 - 346
  • [28] Novel Image Encryption Using a Pseudoset Generated by Chaotic Permutation Multicircular Shrinking With a Gradual Deletion of the Input Set
    Ramli, Kalamullah
    Suryanto, Yohan
    Magfirawaty
    Hayati, Nur
    IEEE ACCESS, 2020, 8 : 110351 - 110361
  • [29] Image encryption based on image authentication and multiple chaotic systems
    Pu, Changjiu
    Yang, Huaqian
    International Review on Computers and Software, 2012, 7 (04) : 1893 - 1899
  • [30] A novel chaotic image encryption with FSV based global bit-level chaotic permutation
    Yongjin Xian
    Xingyuan Wang
    Yingqian Zhang
    Xiaopeng Yan
    Ziyu Leng
    Multimedia Tools and Applications, 2023, 82 : 407 - 426