Research on the Development of Chaotic Image Encryption

Authors

  • Chao Huang
  • Mingqiang Gao
  • Haoyuan Ma

DOI:

https://doi.org/10.62051/ijcsit.v3n1.27

Keywords:

Cryptography, Image encryption, Chaotic system, Encryption algorithm

Abstract

With the development of the information age, the use of images for information expression has become very common. In view of the security of images, more and more scholars begin to study image encryption. In this paper, we briefly describe the development of chaotic image encryption field, describe the concept of chaos theory, chaotic characteristics and discriminant criteria, common typical chaotic systems, security analysis methods and development summary.

Downloads

Download data is not yet available.

References

Devaney R L. (1989). An introduction to chaotic dynamical systems. New York, Westview Press. https://doi.org/10.4324/9780429502309

May R M. (1976). Simple mathematical models with very complicated dynamics. Nature 261(5560),459-467. https://doi.org/10.1038/261459a0

Hénon M. (1976). A two-dimensional mapping with a strange attractor. Communications in Mathematical Physics 50(1),69-77. https://doi.org/10.1007/BF01608556

Lorenz E N. (1963). Deterministic Nonperiodic Flow. Journal of the Atmospheric Sciences, 20(2),130-141. https://doi.org/10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2

Wu Z, Pan P, Sun C. et al. (2021). Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm. Entropy (Basel) 23(9),1159. https://doi.org/10.3390/e23091159

Lee Y-S, Lee Y-J, Han D-G. et al. (2012). Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E95.A(6),1091-1094. https://doi.org/10.1587/transfun.E95.A.1091

Downloads

Published

15-06-2024

Issue

Section

Articles

How to Cite

Huang, C., Gao, M., & Ma, H. (2024). Research on the Development of Chaotic Image Encryption. International Journal of Computer Science and Information Technology, 3(1), 213-218. https://doi.org/10.62051/ijcsit.v3n1.27