Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Avalanche Characteristics of Substitution-Permutation Encryption Networks
IEEE Transactions on Computers
Design and realization of a new signal security system for multimedia data transmission
EURASIP Journal on Applied Signal Processing
On the security defects of an image encryption scheme
Image and Vision Computing
A novel group key management based on Jacobian Elliptic Chebyshev rational map
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
A Novel Multicast Key Exchange Algorithm Based on Extended Chebyshev Map
CISIS '10 Proceedings of the 2010 International Conference on Complex, Intelligent and Software Intensive Systems
A chaos-based symmetric image encryption scheme using a bit-level permutation
Information Sciences: an International Journal
Collision-based flexible image encryption algorithm
Journal of Systems and Software
A new image encryption algorithm based on one-dimensional polynomial chaotic maps
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Local Shannon entropy measure with statistical tests for image randomness
Information Sciences: an International Journal
Hi-index | 0.00 |
In this paper, a novel image encryption algorithm based on the Jacobian elliptic maps is presented. To illustrate the effectiveness of the proposed scheme, some security analyses are presented. It can be concluded that, the proposed image encryption technique can be applied for practical applications. Although the Jacobian elliptic maps presented in this paper aim at image encryption, it is not just limited to this experience and can be directly applied in other information security fields such as video encryption.