Research on the Development of Chaotic Image Encryption
DOI:
https://doi.org/10.62051/ijcsit.v3n1.27Keywords:
Cryptography, Image encryption, Chaotic system, Encryption algorithmAbstract
With the development of the information age, the use of images for information expression has become very common. In view of the security of images, more and more scholars begin to study image encryption. In this paper, we briefly describe the development of chaotic image encryption field, describe the concept of chaos theory, chaotic characteristics and discriminant criteria, common typical chaotic systems, security analysis methods and development summary.
Downloads
References
Devaney R L. (1989). An introduction to chaotic dynamical systems. New York, Westview Press. https://doi.org/10.4324/9780429502309
May R M. (1976). Simple mathematical models with very complicated dynamics. Nature 261(5560),459-467. https://doi.org/10.1038/261459a0
Hénon M. (1976). A two-dimensional mapping with a strange attractor. Communications in Mathematical Physics 50(1),69-77. https://doi.org/10.1007/BF01608556
Lorenz E N. (1963). Deterministic Nonperiodic Flow. Journal of the Atmospheric Sciences, 20(2),130-141. https://doi.org/10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2
Wu Z, Pan P, Sun C. et al. (2021). Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm. Entropy (Basel) 23(9),1159. https://doi.org/10.3390/e23091159
Lee Y-S, Lee Y-J, Han D-G. et al. (2012). Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E95.A(6),1091-1094. https://doi.org/10.1587/transfun.E95.A.1091
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.