An image encryption algorithm based on balanced pixel and chaotic map (Q1717879): Difference between revisions
From MaRDI portal
Set profile property. |
ReferenceBot (talk | contribs) Changed an Item |
||
(One intermediate revision by one other user not shown) | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1155/2014/216048 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2054159849 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Image encryption using DNA addition combining with chaotic maps / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A novel image encryption algorithm based on a 3D chaotic map / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: An image encryption scheme with a pseudorandom permutation based on chaotic maps / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Application of \(S\)-box and chaotic map for image encryption / rank | |||
Normal rank |
Latest revision as of 02:16, 18 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | An image encryption algorithm based on balanced pixel and chaotic map |
scientific article |
Statements
An image encryption algorithm based on balanced pixel and chaotic map (English)
0 references
8 February 2019
0 references
Summary: Image encryption technology has been applied in many fields and is becoming the main way of protecting the image information security. There are also many ways of image encryption. However, the existing encryption algorithms, in order to obtain a better effect of encryption, always need encrypting several times. There is not an effective method to decide the number of encryption times, generally determined by the human eyes. The paper proposes an image encryption algorithm based on chaos and simultaneously proposes a balanced pixel algorithm to determine the times of image encryption. Many simulation experiments have been done including encryption effect and security analysis. Experimental results show that the proposed method is feasible and effective.
0 references