A general chaotic key stream generator for image encryption

被引:0
|
作者
Image Processing Center, Beijing University of Aeronautics and Astronautics, Beijing , China [1 ]
机构
来源
J. Inf. Comput. Sci. | / 17卷 / 6201-6208期
关键词
Sensitivity analysis;
D O I
10.12733/jics20104933
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Chaotic Image Encryption with Hash Keying as Key Generator
    Gopalakrishnan, T.
    Ramakrishnan, S.
    IETE JOURNAL OF RESEARCH, 2017, 63 (02) : 172 - 187
  • [2] Robust chaotic key stream generator for real-time images encryption
    Azzaz, M. S.
    Tanougast, C.
    Sadoudi, S.
    Dandache, A.
    JOURNAL OF REAL-TIME IMAGE PROCESSING, 2013, 8 (03) : 297 - 306
  • [3] Robust chaotic key stream generator for real-time images encryption
    M. S. Azzaz
    C. Tanougast
    S. Sadoudi
    A. Dandache
    Journal of Real-Time Image Processing, 2013, 8 : 297 - 306
  • [4] Chaotic image encryption based on circular substitution box and key stream buffer
    Zhang, Xuanping
    Zhao, Zhongmeng
    Wang, Jiayin
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (08) : 902 - 913
  • [5] Efficient neural chaotic generator for image encryption
    Kassem, Ali
    Hassan, Hussein Al Haj
    Harkouss, Youssef
    Assaf, Rima
    DIGITAL SIGNAL PROCESSING, 2014, 25 : 266 - 274
  • [6] A one-round medical image encryption algorithm based on a combined chaotic key generator
    Kumar, D.
    Sudha, V. K.
    Ranjithkumar, R.
    MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING, 2023, 61 (01) : 205 - 227
  • [7] A one-round medical image encryption algorithm based on a combined chaotic key generator
    Medical & Biological Engineering & Computing, 2023, 61 : 205 - 227
  • [8] Image encryption algorithm using chaotic Chebyshev generator
    Huang, Xiaoling
    NONLINEAR DYNAMICS, 2012, 67 (04) : 2411 - 2417
  • [9] Image encryption algorithm using chaotic Chebyshev generator
    Xiaoling Huang
    Nonlinear Dynamics, 2012, 67 : 2411 - 2417
  • [10] A Secure Image Encryption Algorithm Using LFSR and RC4 Key Stream Generator
    Mondal, Bhaskar
    Sinha, Nishith
    Mandal, Tarni
    PROCEEDINGS OF 3RD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND INFORMATICS (ICACNI 2015), VOL 1, 2016, 43 : 227 - 237