• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4660665)   Today's Articles (5538)   Subscriber (51478)
For: Pisarchik AN, Flores-Carmona NJ, Carpio-Valadez M. Encryption and decryption of images with chaotic map lattices. Chaos 2006;16:033118. [PMID: 17014223 DOI: 10.1063/1.2242052] [Citation(s) in RCA: 22] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/12/2023]
Number Cited by Other Article(s)
1
Wang X, Liu C, Jiang D. A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3D DCT. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2021.06.032] [Citation(s) in RCA: 25] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/28/2023]
2
Yan W, Jiang Z, Huang X, Ding Q. A Three-Dimensional Infinite Collapse Map with Image Encryption. ENTROPY 2021;23:e23091221. [PMID: 34573846 PMCID: PMC8472400 DOI: 10.3390/e23091221] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/18/2021] [Revised: 09/12/2021] [Accepted: 09/13/2021] [Indexed: 11/16/2022]
3
A Novel S-Box Dynamic Design Based on Nonlinear-Transform of 1D Chaotic Maps. ELECTRONICS 2021. [DOI: 10.3390/electronics10111313] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
4
Li T, Zhang D. Hyperchaotic Image Encryption Based on Multiple Bit Permutation and Diffusion. ENTROPY 2021;23:e23050510. [PMID: 33922594 PMCID: PMC8146381 DOI: 10.3390/e23050510] [Citation(s) in RCA: 14] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Key Words] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/19/2021] [Revised: 04/21/2021] [Accepted: 04/22/2021] [Indexed: 11/16/2022]
5
Janardhanan SV, Sanjeeva P. Bogdanov Map-based Permuted Double Image Encryption. AN ACAD BRAS CIENC 2020;92:e20181207. [PMID: 32785426 DOI: 10.1590/0001-3765202020181207] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/31/2017] [Accepted: 03/05/2019] [Indexed: 11/22/2022]  Open
6
Nepomuceno EG, Nardo LG, Arias-Garcia J, Butusov DN, Tutueva A. Image encryption based on the pseudo-orbits from 1D chaotic map. CHAOS (WOODBURY, N.Y.) 2019;29:061101. [PMID: 31266342 DOI: 10.1063/1.5099261] [Citation(s) in RCA: 18] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 04/08/2019] [Accepted: 05/15/2019] [Indexed: 06/09/2023]
7
Cryptographic construction using coupled map lattice as a diffusion model to enhanced security. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2019. [DOI: 10.1016/j.jisa.2019.02.011] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
8
Kumar S, Kumar M, Budhiraja R, Das M, Singh S. A cryptographic model for better information security. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2018. [DOI: 10.1016/j.jisa.2018.10.011] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
9
Ismail SM, Said LA, Radwan AG, Madian AH, Abu-Elyazeed MF. Generalized double-humped logistic map-based medical image encryption. J Adv Res 2018;10:85-98. [PMID: 30034869 PMCID: PMC6052686 DOI: 10.1016/j.jare.2018.01.009] [Citation(s) in RCA: 57] [Impact Index Per Article: 8.1] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/26/2017] [Revised: 01/15/2018] [Accepted: 01/24/2018] [Indexed: 11/11/2022]  Open
10
Elkady MM, Elnaby MMA, Hussein AH, Kader HMA. Chaotic Based Technique for Partial Image Encryption. 2016 26TH INTERNATIONAL CONFERENCE ON COMPUTER THEORY AND APPLICATIONS (ICCTA) 2016. [DOI: 10.1109/iccta40200.2016.9512943] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
11
Radwan AG, AbdElHaleem SH, Abd-El-Hafiz SK. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review. J Adv Res 2015;7:193-208. [PMID: 26966561 PMCID: PMC4767812 DOI: 10.1016/j.jare.2015.07.002] [Citation(s) in RCA: 65] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/27/2015] [Revised: 07/24/2015] [Accepted: 07/27/2015] [Indexed: 11/18/2022]  Open
12
A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 2015. [DOI: 10.1016/j.asoc.2014.09.039] [Citation(s) in RCA: 284] [Impact Index Per Article: 28.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
13
A block chaotic image encryption scheme based on self-adaptive modelling. Appl Soft Comput 2014. [DOI: 10.1016/j.asoc.2014.05.025] [Citation(s) in RCA: 34] [Impact Index Per Article: 3.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
14
Zhang YQ, Wang XY. A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.02.156] [Citation(s) in RCA: 449] [Impact Index Per Article: 40.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
15
Zanin M, Pisarchik AN. Gray code permutation algorithm for high-dimensional data encryption. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.02.131] [Citation(s) in RCA: 31] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
16
Fu C, Meng WH, Zhan YF, Zhu ZL, Lau FCM, Tse CK, Ma HF. An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 2013;43:1000-10. [PMID: 23816172 DOI: 10.1016/j.compbiomed.2013.05.005] [Citation(s) in RCA: 130] [Impact Index Per Article: 10.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/03/2011] [Revised: 05/06/2013] [Accepted: 05/07/2013] [Indexed: 11/15/2022]
17
Wang X, Zhang W, Guo W, Zhang J. Secure chaotic system with application to chaotic ciphers. Inf Sci (N Y) 2013. [DOI: 10.1016/j.ins.2012.09.037] [Citation(s) in RCA: 46] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
18
A Non-adaptive Partial Encryption of Grayscale Images based on Chaos. ACTA ACUST UNITED AC 2013. [DOI: 10.1016/j.protcy.2013.12.408] [Citation(s) in RCA: 28] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
19
Image encryption using DNA complementary rule and chaotic maps. Appl Soft Comput 2012. [DOI: 10.1016/j.asoc.2012.01.016] [Citation(s) in RCA: 452] [Impact Index Per Article: 34.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
20
El-Latif AAA, Li L, Wang N, Niu X. Image Encryption Scheme of Pixel Bit Based on Combination of Chaotic Systems. 2011 SEVENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING 2011. [DOI: 10.1109/iihmsp.2011.67] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
21
Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers. STUDIES IN COMPUTATIONAL INTELLIGENCE 2011. [DOI: 10.1007/978-3-642-20542-2_8] [Citation(s) in RCA: 41] [Impact Index Per Article: 2.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/15/2022]
22
Solak E. Cryptanalysis of Chaotic Ciphers. ACTA ACUST UNITED AC 2011. [DOI: 10.1007/978-3-642-20542-2_7] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/17/2023]
23
Algebraic break of image ciphers based on discretized chaotic map lattices. Inf Sci (N Y) 2011. [DOI: 10.1016/j.ins.2010.09.009] [Citation(s) in RCA: 45] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
24
Li C, Lo KT. Cryptanalysis of an Image Encryption Scheme Using Cellular Automata Substitution and SCAN. ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2010 2010. [DOI: 10.1007/978-3-642-15702-8_55] [Citation(s) in RCA: 5] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/13/2022]
25
Arroyo D, Alvarez G, Li S. Some Hints for the Design of Digital Chaos-Based Cryptosystems: Lessons Learned from Cryptanalysis. ACTA ACUST UNITED AC 2009. [DOI: 10.3182/20090622-3-uk-3004.00034] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
26
Solak E, Cokal C. Comment on "Encryption and decryption of images with chaotic map lattices" [Chaos 16, 033118 (2006)]. CHAOS (WOODBURY, N.Y.) 2008;18:038101. [PMID: 19045506 DOI: 10.1063/1.2966114] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/27/2023]
27
Arroyo D, Rhouma R, Alvarez G, Li S, Fernandez V. On the security of a new image encryption scheme based on chaotic map lattices. CHAOS (WOODBURY, N.Y.) 2008;18:033112. [PMID: 19045450 DOI: 10.1063/1.2959102] [Citation(s) in RCA: 19] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/27/2023]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA