A chaotic image encryption algorithm based on perceptron model
From MaRDI portal
Publication:2431035
DOI10.1007/S11071-010-9749-8zbMATH Open1209.94015OpenAlexW1993294505WikidataQ121699627 ScholiaQ121699627MaRDI QIDQ2431035FDOQ2431035
Authors: Lei Yang, Rong Liu, Abdurahman Kadir, Xingyuan Wang
Publication date: 8 April 2011
Published in: Nonlinear Dynamics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11071-010-9749-8
Recommendations
- Breaking a chaotic image encryption algorithm based on perceptron model
- A new image encryption algorithm based on 3D chaotic system
- An image encryption algorithm based on combined multi-dimension chaotic system
- A new chaotic image encryption algorithm based on cross-mapping
- On the security analysis of a Hopfield chaotic neural network-based image encryption algorithm
Cryptography (94A60) Image processing (compression, reconstruction, etc.) in information and communication theory (94A08)
Cites Work
- Deterministic Nonperiodic Flow
- Synchronization in chaotic systems
- Cryptanalysis of a discrete chaotic cryptosystem using external key
- Controlling chaos
- Cryptography with chaos
- Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps
- Chaotic synchronization and secure communication based on descriptor observer
- Secure digital communication using discrete-time chaos synchronization
- Cryptography based on chaotic random maps with position dependent weighting probabilities
- Chaos synchronization of Rikitake chaotic attractor using the passive control technique
- Cryptography using multiple one-dimensional chaotic maps
- Discrete chaotic cryptography using external key
- Baptista-type chaotic cryptosystems: problems and countermeasures
Cited In (43)
- Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
- Cryptanalysis and improvement of a chaotic map-based key agreement protocol using Chebyshev sequence membership testing
- Image encryption using complex hyper chaotic system by injecting impulse into parameters
- Analysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system
- Breaking a chaotic image encryption algorithm based on perceptron model
- Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos
- Chaos based efficient selective image encryption
- An extended chaotic-maps-based protocol with key agreement for multiserver environments
- An image encryption algorithm based on the perturbed high-dimensional chaotic map
- A novel image encryption algorithm based on SPWLCM and DNA coding
- RETRACTED: Fresnelet approach for image encryption in the algebraic frame
- Double image encryption algorithm based on neural network and chaos
- Cryptanalysis and constructing S-box based on chaotic map and backtracking
- A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2
- Construction of chaotic quantum magnets and matrix Lorenz systems S-boxes and their applications
- A secure image encryption algorithm based on Rubik's cube principle
- Image encryption application in a system for compounding self-excited and hidden attractors
- Image encryption based on dynamic filtering and bit cuboid operations
- Dynamical analysis and encryption key-distribution application of new q-deformed reduced Lorenz system
- A revised key agreement protocol based on chaotic maps
- Advances in Neural Networks – ISNN 2005
- Dynamic substitution based encryption algorithm for highly correlated data
- A novel Devaney chaotic map with uniform trajectory for color image encryption
- A novel image encryption scheme based on 2-D logistic map and DNA sequence operations
- Chaos-based diffusion for highly autocorrelated data in encryption algorithms
- Image encryption algorithm based on chaotic economic model
- Reversible integer wavelet transform for the joint of image encryption and watermarking
- A new study of chaotic behavior and the existence of Feigenbaum's constants in fractional-degree Yin-Yang Hénon maps
- A new hybrid chaotic map and its application on image encryption and hiding
- Cryptanalysis of a chaotic map-based password-authenticated key agreement protocol using smart cards
- A secure image encryption algorithm based on a parametric switching chaotic system
- Hyperchaotic encryption based on multi-scroll piecewise linear systems
- Period of the discrete Arnold cat map and general cat map
- Adaptive output feedback control of uncertain nonlinear chaotic systems based on dynamic surface control technique
- Color multiple image encryption scheme based on 3D-chaotic maps
- A Novel Color Image Encryption Algorithm Based on Hyperchaotic System and Permutation-Diffusion Architecture
- Improvement in new three-party-authenticated key agreement scheme based on chaotic maps without password table
- A novel efficient image encryption algorithm based on affine transformation combine with linear fractional transformation
- Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol
- An efficient online/offline ID-based short signature procedure using extended chaotic maps
- A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps
- Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
- A new digital signature scheme based on chaotic maps
This page was built for publication: A chaotic image encryption algorithm based on perceptron model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2431035)