Reduction of Dynamical Degradation in Chaotic Image Encryption System by Coupling Multiple Chaotic Maps and Perturbation
暂无分享,去创建一个
Debashis Nandi | Mrinal Kanti Mondal | D. Chattopadhyay | Debasish Chattopadhyay | M. Mondal | Debashis Nandi
[1] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .
[2] Gonzalo Alvarez,et al. Chaotic cryptosystems , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[3] Jinsheng Sun,et al. A block cipher based on a suitable use of the chaotic standard map , 2005 .
[4] Kwok-Wo Wong,et al. A Fast Image Encryption Scheme based on Chaotic Standard Map , 2006, ArXiv.
[5] G. Álvarez,et al. Cryptanalysis of a chaotic encryption system , 2000 .
[6] Osama S. Faragallah,et al. An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.
[7] J. Yorke,et al. Period Three Implies Chaos , 1975 .
[8] Jiun-In Guo,et al. A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).
[9] O. Rössler. An equation for continuous chaos , 1976 .
[10] G. Álvarez,et al. Breaking parameter modulated chaotic secure communication system , 2003, nlin/0311041.
[11] Shujun Li,et al. Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[12] M. Hénon,et al. A two-dimensional mapping with a strange attractor , 1976 .
[13] L. Horwitz,et al. BE A STRANGE ATTRACTOR ? , 2004 .
[14] Guanrong Chen,et al. On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.
[15] M. Gotz,et al. Discrete-time chaotic encryption systems. I. Statistical design approach , 1997 .
[16] Guanrong Chen,et al. Chaos-Based Image Encryption , 2005 .
[17] Vinod Patidar,et al. Discrete chaotic cryptography using external key , 2003 .
[18] Long Min,et al. An image encryption algorithm based on mixed chaotic dynamic systems and external keys , 2005, Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005..
[19] Ljupco Kocarev,et al. From chaotic maps to encryption schemes , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).
[20] Vinod Patidar,et al. Image encryption using chaotic logistic map , 2006, Image Vis. Comput..
[21] M. Feigenbaum. Quantitative universality for a class of nonlinear transformations , 1978 .
[22] A. N. Sharkovskiĭ. COEXISTENCE OF CYCLES OF A CONTINUOUS MAP OF THE LINE INTO ITSELF , 1995 .
[23] D. Chattopadhyay,et al. Robust Chaotic Image Encryption based on Perturbation Technique , 2011 .
[24] L. Kocarev,et al. Logistic map as a block encryption algorithm , 2001 .
[25] Guanrong Chen,et al. A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.
[26] Xuanqin Mou,et al. Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.
[27] N. Bourbakis,et al. Data-image-video encryption , 2004, IEEE Potentials.
[28] Henri Poincaré,et al. New methods of celestial mechanics , 1967 .
[29] Shujun Li,et al. Analyses and New Designs of Digital Chaotic Ciphers , 2003 .
[30] L. Chua,et al. CLARIFYING CHAOS: EXAMPLES AND COUNTEREXAMPLES , 1996 .