Optical and Digital Techniques for Information Security
Optical and Digital Techniques for Information Security
A blind source separation-based method for multiple images encryption
Image and Vision Computing
Image encryption with compound chaotic sequence cipher shifting dynamically
Image and Vision Computing
Letters: A block cipher based on chaotic neural networks
Neurocomputing
On the security defects of an image encryption scheme
Image and Vision Computing
A fast fractal image encoding method based on intelligent search of standard deviation
Computers and Electrical Engineering
Encryption System with Variable Number of Registers
Computers and Electrical Engineering
Compression-unimpaired batch-image encryption combining vector quantization and index compression
Information Sciences: an International Journal
Color image encryption based on one-time keys and robust chaotic maps
Computers & Mathematics with Applications
A chaos-based symmetric image encryption scheme using a bit-level permutation
Information Sciences: an International Journal
An extended matrix encoding algorithm for steganography of high embedding efficiency
Computers and Electrical Engineering
Breaking row-column shuffle based image cipher
Proceedings of the 20th ACM international conference on Multimedia
Computers and Electrical Engineering
Hi-index | 0.00 |
In this paper, a robust hybrid image encryption algorithm with permutation-diffusion structure is proposed, based on chaotic control parameters and hyper-chaotic system. In the proposed method, a chaotic logistic map is employed to generate the control parameters for the permutation stage which results in shuffling the image rows and columns to disturb the high correlation among pixels. Next, in the diffusion stage, another chaotic logistic map with different initial conditions and parameters is employed to generate the initial conditions for a hyper-chaotic Hopfield neural network to generate a keystream for image homogenization of the shuffled image. The new hybrid method has been compared with several existing methods and shows comparable or superior robustness to blind decryption.