An image encryption algorithm based on balanced pixel and chaotic map (Q1717879): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1155/2014/216048 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2054159849 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Image encryption using DNA addition combining with chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: A novel image encryption algorithm based on a 3D chaotic map / rank
 
Normal rank
Property / cites work
 
Property / cites work: An image encryption scheme with a pseudorandom permutation based on chaotic maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Application of \(S\)-box and chaotic map for image encryption / rank
 
Normal rank

Latest revision as of 02:16, 18 July 2024

scientific article
Language Label Description Also known as
English
An image encryption algorithm based on balanced pixel and chaotic map
scientific article

    Statements

    An image encryption algorithm based on balanced pixel and chaotic map (English)
    0 references
    0 references
    0 references
    8 February 2019
    0 references
    Summary: Image encryption technology has been applied in many fields and is becoming the main way of protecting the image information security. There are also many ways of image encryption. However, the existing encryption algorithms, in order to obtain a better effect of encryption, always need encrypting several times. There is not an effective method to decide the number of encryption times, generally determined by the human eyes. The paper proposes an image encryption algorithm based on chaos and simultaneously proposes a balanced pixel algorithm to determine the times of image encryption. Many simulation experiments have been done including encryption effect and security analysis. Experimental results show that the proposed method is feasible and effective.
    0 references

    Identifiers