Cryptologia
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT'91
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence
Image and Vision Computing
A new chaos-based fast image encryption algorithm
Applied Soft Computing
Chaos based image encryption scheme based on enhanced logistic map
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
WSEAS Transactions on Computers
The novel bilateral - Diffusion image encryption algorithm with dynamical compound chaos
Journal of Systems and Software
A robust hybrid method for image encryption based on Hopfield neural network
Computers and Electrical Engineering
A novel image encryption/decryption scheme based on chaotic neural networks
Engineering Applications of Artificial Intelligence
A RGB image encryption algorithm based on DNA encoding and chaos map
Computers and Electrical Engineering
Local Shannon entropy measure with statistical tests for image randomness
Information Sciences: an International Journal
Image scrambling based on chaotic sequences and Veginère cipher
Multimedia Tools and Applications
A family of new complex number chaotic maps based image encryption algorithm
Image Communication
Hi-index | 0.00 |
We design a new two-dimensional chaotic function using two one-dimensional chaotic functions, and then prove the chaotic properties to a new function based on a strict Devaney definition. And we propose a new encrypting image scheme using the new compound chaotic function by choosing one of the two one-dimensional chaotic functions randomly. We give statistical analysis, sequence random analysis, and sensitivity analysis to plaintext and key on the proposed scheme. The experimental results show that the new scheme has a very fast encryption speed and the key space is expanded and it can resist all kinds of cryptanalytic, statistical and brute-force attacks, and especially, our new method can be also used to solve the problem that is easily exposed to chosen plaintext attack and low digitization of one-dimensional chaotic function.