• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4660665)   Today's Articles (4953)   Subscriber (51477)
For: Xiang T, Wong KW, Liao X. Selective image encryption using a spatiotemporal chaotic system. Chaos 2007;17:023115. [PMID: 17614669 DOI: 10.1063/1.2728112] [Citation(s) in RCA: 17] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/16/2023]
Number Cited by Other Article(s)
1
Geng S, Li J, Zhang X, Wang Y. An Image Encryption Algorithm Based on Improved Hilbert Curve Scrambling and Dynamic DNA Coding. ENTROPY (BASEL, SWITZERLAND) 2023;25:1178. [PMID: 37628208 PMCID: PMC10453945 DOI: 10.3390/e25081178] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/30/2023] [Revised: 07/30/2023] [Accepted: 08/05/2023] [Indexed: 08/27/2023]
2
Using Singular Value Decomposition and Chaotic Maps for Selective Encryption of Video Feeds in Smart Traffic Management. APPLIED SCIENCES-BASEL 2022. [DOI: 10.3390/app12083917] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 02/06/2023]
3
Kong S, Li C, Jiang H, Lai Q, Jiang X. A 2D hyperchaotic map with conditional symmetry and attractor growth. CHAOS (WOODBURY, N.Y.) 2021;31:043121. [PMID: 34251242 DOI: 10.1063/5.0043458] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/08/2021] [Accepted: 03/29/2021] [Indexed: 06/13/2023]
4
Kh-Madhloom J, Khanapi Abd Ghani M, Rizuan Baharon M. ECG Encryption Enhancement Technique with Multiple Layers of AES and DNA Computing. INTELLIGENT AUTOMATION & SOFT COMPUTING 2021;28:493-512. [DOI: 10.32604/iasc.2021.015129] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/07/2020] [Accepted: 01/23/2021] [Indexed: 09/02/2023]
5
El-Meadawy SA, Farghal AEA, Shalaby HMH, Ismail NA, El-Samie FEA, Abd-Elnaby M, El-Shafai W. Efficient and Secure Bit-Level Chaos Security Algorithm for Orbital Angular Momentum Modulation in Free-Space Optical Communications. IEEE ACCESS 2021;9:74817-74835. [DOI: 10.1109/access.2021.3074894] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/01/2023]
6
Tao Y, Cui W, Zhang Z. Spatiotemporal chaos in multiple dynamically coupled map lattices and its application in a novel image encryption algorithm. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020. [DOI: 10.1016/j.jisa.2020.102650] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
7
Song W, Zheng Y, Fu C, Shan P. A novel batch image encryption algorithm using parallel computing. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.01.009] [Citation(s) in RCA: 15] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
8
A Novel Secure Occupancy Monitoring Scheme Based on Multi-Chaos Mapping. Symmetry (Basel) 2020. [DOI: 10.3390/sym12030350] [Citation(s) in RCA: 16] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]  Open
9
Butt KK, Li G, Khan S, Manzoor S. Fast and Efficient Image Encryption Algorithm Based on Modular Addition and SPD. ENTROPY 2020;22:e22010112. [PMID: 33285886 PMCID: PMC7516419 DOI: 10.3390/e22010112] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/14/2019] [Revised: 01/08/2020] [Accepted: 01/10/2020] [Indexed: 11/16/2022]
10
Cryptographic construction using coupled map lattice as a diffusion model to enhanced security. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2019. [DOI: 10.1016/j.jisa.2019.02.011] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
11
Xu M, Tian Z. A novel image cipher based on 3D bit matrix and latin cubes. Inf Sci (N Y) 2019. [DOI: 10.1016/j.ins.2018.11.010] [Citation(s) in RCA: 35] [Impact Index Per Article: 5.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
12
Kumar S, Kumar M, Budhiraja R, Das M, Singh S. A cryptographic model for better information security. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2018. [DOI: 10.1016/j.jisa.2018.10.011] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
13
A Symmetric Plaintext-Related Color Image Encryption System Based on Bit Permutation. ENTROPY 2018;20:e20040282. [PMID: 33265373 PMCID: PMC7512799 DOI: 10.3390/e20040282] [Citation(s) in RCA: 37] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/23/2018] [Revised: 04/10/2018] [Accepted: 04/11/2018] [Indexed: 11/17/2022]
14
Kong C, Chen H, Li C, Hai W. Controlling chaotic spin-motion entanglement of ultracold atoms via spin-orbit coupling. CHAOS (WOODBURY, N.Y.) 2018;28:023115. [PMID: 29495662 DOI: 10.1063/1.5009534] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
15
A new image encryption algorithm based on non-adjacent coupled map lattices. Appl Soft Comput 2015. [DOI: 10.1016/j.asoc.2014.09.039] [Citation(s) in RCA: 284] [Impact Index Per Article: 28.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
16
Fu C, Zhang GY, Bian O, Lei WM, Ma HF. A novel medical image protection scheme using a 3-dimensional chaotic system. PLoS One 2014;9:e115773. [PMID: 25541941 PMCID: PMC4277340 DOI: 10.1371/journal.pone.0115773] [Citation(s) in RCA: 32] [Impact Index Per Article: 2.9] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/19/2014] [Accepted: 11/27/2014] [Indexed: 11/18/2022]  Open
17
Eyebe Fouda JA, Effa JY, Ali M. Highly secured chaotic block cipher for fast image encryption. Appl Soft Comput 2014. [DOI: 10.1016/j.asoc.2014.08.059] [Citation(s) in RCA: 19] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
18
Zhang YQ, Wang XY. A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.02.156] [Citation(s) in RCA: 449] [Impact Index Per Article: 40.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
19
Chaotic image encryption based on running-key related to plaintext. ScientificWorldJournal 2014;2014:490179. [PMID: 24711727 PMCID: PMC3953620 DOI: 10.1155/2014/490179] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/03/2013] [Accepted: 01/12/2014] [Indexed: 11/17/2022]  Open
20
A Symmetric Chaos-Based Image Cipher with an Improved Bit-Level Permutation Strategy. ENTROPY 2014. [DOI: 10.3390/e16020770] [Citation(s) in RCA: 32] [Impact Index Per Article: 2.9] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
21
Chen JX, Zhu ZL, Fu C, Yu H. An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism. OPTICS EXPRESS 2013;21:27873-27890. [PMID: 24514304 DOI: 10.1364/oe.21.027873] [Citation(s) in RCA: 11] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/03/2023]
22
Fu C, Meng WH, Zhan YF, Zhu ZL, Lau FCM, Tse CK, Ma HF. An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 2013;43:1000-10. [PMID: 23816172 DOI: 10.1016/j.compbiomed.2013.05.005] [Citation(s) in RCA: 130] [Impact Index Per Article: 10.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/03/2011] [Revised: 05/06/2013] [Accepted: 05/07/2013] [Indexed: 11/15/2022]
23
Fu C, Chen JJ, Zou H, Meng WH, Zhan YF, Yu YW. A chaos-based digital image encryption scheme with an improved diffusion strategy. OPTICS EXPRESS 2012;20:2363-2378. [PMID: 22330475 DOI: 10.1364/oe.20.002363] [Citation(s) in RCA: 30] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/31/2023]
24
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring ZN. Inf Sci (N Y) 2011. [DOI: 10.1016/j.ins.2011.07.008] [Citation(s) in RCA: 12] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA