Acknowledgement
Supported by : National Natural Science Foundation of China
References
- Y. Wang, K. W. Wong, X. F. Liao, T. Xiang and G. R. Chen, "A chaos-based image encryption algorithm with variable control parameters," Chaos, Solitons & Fractals, vol. 41, no. 4, pp. 1773-1783, 2009. https://doi.org/10.1016/j.chaos.2008.07.031
- C. Fu, W. H. Meng, Y. F. Zhan, Z. L. Zhu, F. C. M. Lau, C. K. Tse and H. F. Ma, "An efficient and secure medical image protection scheme based on chaotic maps," Computers in biology and medicine, vol. 43, no. 8, pp. 1000-1010, 2013. https://doi.org/10.1016/j.compbiomed.2013.05.005
- N. K. Pareek, V. Patidar and K. K. Sud, "Cryptography using multiple one-dimensional chaotic maps," Communications in Nonlinear Science and Numerical Simulation, vol. 10, no. 7, pp. 715-723, 2005. https://doi.org/10.1016/j.cnsns.2004.03.006
- Q. Mao, C. C. Chang and H. L. Wu, "An image encryption scheme based on concatenated torus automorphisms," KSII Transactions on Internet & Information Systems, vol. 7, no. 6, pp. 1492-1511, 2013. https://doi.org/10.3837/tiis.2013.06.009
- K. Muhammad, J. Ahmad, H. Farman, Z. Jan, M. Sajjad and S. W. Baik, "A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption," KSII Transactions on Internet & Information Systems, vol. 9, no. 5, pp. 1938-1962, 2015. https://doi.org/10.3837/tiis.2015.05.022
- Y. J. Liu and Y. Q. Zheng, "Adaptive robust fuzzy control for a class of uncertain chaotic systems," Nonlinear dynamics, vol. 57, no. 3, pp. 431-439, 2009. https://doi.org/10.1007/s11071-008-9453-0
- C. Q. Wang, X. Zhang and Z. M. Zheng, "Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme," PLoS One, vol. 11, no. 2, pp. e0149173, 2016. https://doi.org/10.1371/journal.pone.0149173
- C. Q. Wang, X. Zhang and Z. M. Zheng, "A novel image encryption algorithm based on multiple chaotic systems and self-adaptive model," in Proc. of the 2015 International Conference on Communications, Signal Processing, and Systems, pp. 677-685, 2016.
- O. Fatih, O. B. Ahmet and Y. Sirma, "Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences," Optics Communications, vol. 285, no. 24, pp. 4946-4948, 2012. https://doi.org/10.1016/j.optcom.2012.07.106
- D. Xiao, X. F. Liao, S. J. Deng, "A novel key agreement protocol based on chaotic maps," Information Sciences, vol. 177, no. 4, pp.1136-1142, 2007. https://doi.org/10.1016/j.ins.2006.07.026
- C. C. Lee, C. L. Chen, C. Y. Wu and S. Y. Huang, "An extended chaotic maps-based key agreement protocol with user anonymity," Nonlinear Dynamics, vol. 69, no. 1, pp. 79-87, 2012. https://doi.org/10.1007/s11071-011-0247-4
- C. Q. Li, Y. S. Liu, T. Xie and M. Z. Q. Chen, "Breaking a novel image encryption scheme based on improved hyper-chaotic sequences," Nonlinear Dynamics, vol. 73, no. 3, pp. 2083-2089, 2013. https://doi.org/10.1007/s11071-013-0924-6
- C. Q. Wang, X. Zhang and Z. M. Zheng, "An improved biometrics based authentication scheme using extended chaotic maps for multimedia medicine information systems," Multimedia Tools and Applications, pp. 1-27, 2016.
- C. X. Zhu, "A novel image encryption scheme based on improved hyperchaotic sequences," Optics Communications, vol. 285, no. 1, pp. 29-37, 2012. https://doi.org/10.1016/j.optcom.2011.08.079
- B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh and M. R. Mosavi, "A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion," Multimedia tools and applications, vol. 71, no. 3, pp. 1469-1497, 2014. https://doi.org/10.1007/s11042-012-1292-9
- C. Q. Li, Y. S. Liu, T. Xie and M. Z. Q. Chen, "Breaking a novel image encryption scheme based on improved hyperchaotic sequences," Nonlinear Dynamics, vol. 73, no. 3, pp. 2083-2089, 2013. https://doi.org/10.1007/s11071-013-0924-6
- Y. S. Zhang, D. Xiao, W. Y. Wen and M. Li, "Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process," Nonlinear Dynamics, vol. 76, no. 3, pp. 1645-1650, 2014. https://doi.org/10.1007/s11071-014-1235-2
- E. Solak, C. Cokal, O. T. Yildiz and T. Biyikoglu, "Cryptanalysis of Fridrich's chaotic image encryption," International Journal of Bifurcation and Chaos, vol. 20, no. 5, pp. 1405-1413, 2010. https://doi.org/10.1142/S0218127410026563
- Y. T. Li, D. Xiao, S. J. Deng, Q. Han and G. Zhou, "Parallel Hash function construction based on chaotic maps with changeable parameters," Neural Computing and Applications, vol. 20, no. 8, pp. 1305-1312, 2011. https://doi.org/10.1007/s00521-011-0543-4
- Y. P. Hu, C. X. Zhu and Z. J. Wang, "An improved piecewise linear chaotic map based image encryption algorithm," The Scientific World Journal, pp. 1-7, 2014.
- G. R. Chen, Y. B. Mao and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749-761, 2004. https://doi.org/10.1016/j.chaos.2003.12.022
- T. G. Gao and Z. Q. Chen, "A new image encryption algorithm based on hyper-chaos," Physics Letters A, vol. 372, no. 4, pp. 394-400, 2008. https://doi.org/10.1016/j.physleta.2007.07.040
- G. Alvarez and S. J. Li, "Some basic cryptographic requirements for chaos-based cryptosystems," International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, 2006. https://doi.org/10.1142/S0218127406015970
- P. Ping, F. Xu and Z. J. Wang, "Image encryption based on non-affine and balanced cellular automata," Signal Processing, vol. 105, pp. 419-429, 2014. https://doi.org/10.1016/j.sigpro.2014.06.020
- X. Y. Wang and C. Q. Jin, "Image encryption using game of life permutation and PWLCM chaotic system," Optics Communications, vol. 285, no. 4, pp. 412-417, 2012. https://doi.org/10.1016/j.optcom.2011.10.010
- R. J. Chen and J. L. Lai, "Image security system using recursive cellular automata substitution," Pattern Recognition, vol. 40, no. 5, pp. 1621-1631, 2007. https://doi.org/10.1016/j.patcog.2006.11.011
- L. Y. Zhang, X. B. Hu, Y. S. Liu, K. W. Wong and J. Gan, "A chaotic image encryption scheme owning temp-value feedback," Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 10, pp. 3653-3659, 2014. https://doi.org/10.1016/j.cnsns.2014.03.016
- V. Patidar, N. K. Pareek, G. Purohit and K. K. Sud, "A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption," Optics Communications, vol. 284, no. 19, pp. 4331-4339, 2011. https://doi.org/10.1016/j.optcom.2011.05.028
- X. L. Huang and G. D. Ye, "An efficient self-adaptive model for chaotic image encryption algorithm," Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 12, pp. 4094-4104, 2014. https://doi.org/10.1016/j.cnsns.2014.04.012
- C. Q. Wang, X. Zhang and Z. M. Zheng, "An efficient image encryption algorithm based on a novel chaotic map," Multimedia Tools and Applications, pp. 1-30, 2016.
- C. Q. Li, "Cracking a hierarchical chaotic image encryption algorithm based on permutation," Signal Processing, vol. 118, pp. 203-210, 2016. https://doi.org/10.1016/j.sigpro.2015.07.008
- Z. X. Qian, H. Zhou, X. P. Zhang and W. M. Zhang, "Separable Reversible Data Hiding in Encrypted JPEG Bitstreams," IEEE Transactions on Dependable and Secure Computing, pp. 1-13, 2016.
- Z. X. Qian, X. P. Zhang and S. Z. Wang, "Reversible data hiding in encrypted JPEG bitstream," IEEE transactions on multimedia, vol. 16, no. 5, pp. 1486-1491, 2014. https://doi.org/10.1109/TMM.2014.2316154
Cited by
- Adaptive firefly algorithm based optimized key generation for image security vol.36, pp.5, 2019, https://doi.org/10.3233/jifs-169998
- An ASCII based effective and multi-operation image encryption method vol.79, pp.31, 2017, https://doi.org/10.1007/s11042-020-08897-4
- A New Method of Denoising Crop Image Based on Improved SVD in Wavelet Domain vol.2021, pp.None, 2017, https://doi.org/10.1155/2021/9995813
- Software Implementation and Design of Information Encryption Algorithm Based on DNA Nano Self-Assembled Sensor Array vol.2021, pp.None, 2017, https://doi.org/10.1155/2021/5800620