Access the full text.
Sign up today, get DeepDyve free for 14 days.
Shiguo Lian, Jinsheng Sun, Zhiquan Wang (2005)
A block cipher based on a suitable use of the chaotic standard mapChaos Solitons & Fractals, 26
Shiguo Lian (2008)
Multimedia Content Encryption: Techniques and Applications
A. Jolfaei, Xin-Wen Wu, V. Muthukkumarasamy (2014)
Comments on the security of "Diffusion-substitution based gray image encryption" schemeDigit. Signal Process., 32
(1974)
Numerical study of discrete plane area-preserving mappings, Astron
A. Kadir, A. Hamdulla, Wen-qiang Guo (2014)
Color image encryption using skew tent map and hyper chaotic system of 6th-order CNNOptik, 125
Katherine Struss (2009)
A Chaotic Image Encryption
Yuguang Yang, Qing-Xiang Pan, Si-Jia Sun, Peng Xu (2015)
Novel Image Encryption based on Quantum WalksScientific Reports, 5
H. Noura (2012)
Conception et simulation des générateurs, crypto-systèmes et fonctions de hachage basés chaos performants
Naif Abdulwahed (2013)
CHAOS-BASED ADVANCED ENCRYPTION STANDARD
F. Muhaya (2013)
Chaotic and AES cryptosystem for satellite imageryTelecommunication Systems, 52
Hegui Zhu, Yiran Zhao, Yujia Song (2019)
2D Logistic-Modulated-Sine-Coupling-Logistic Chaotic Map for Image EncryptionIEEE Access, 7
Manish Kumar, Pradeep Powduri, A. Reddy (2015)
An RGB image encryption using diffusion process associated with chaotic mapJ. Inf. Secur. Appl., 21
A. Kassem, H. Hassan, Y. Harkouss, R. Assaf (2014)
Efficient neural chaotic generator for image encryptionDigit. Signal Process., 25
Yue Wu, J. Noonan, S. Agaian (2011)
NPCR and UACI Randomness Tests for Image Encryption
S. Assad, Mousa Farajallah, C. Vladeanu (2014)
Chaos-based block ciphers: An overview2014 10th International Conference on Communications (COMM)
Zhang Yong, Hou Wengang (2016)
A fast image encryption algorithm using plaintext-related confusion, 2016
Zhongyun Hua, Yicong Zhou (2016)
Image encryption using 2D Logistic-adjusted-Sine mapInf. Sci., 339
Kwok-wo Wong, Bernie Kwok, Wing-Shing Law (2006)
A Fast Image Encryption Scheme based on Chaotic Standard MapArXiv, abs/cs/0609158
Yong Zhang, Wengang Hou (2016)
A fast image encryption algorithm using plaintext-related confusion2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference
J. Fridrich (1998)
Symmetric Ciphers Based on Two-Dimensional Chaotic MapsInternational Journal of Bifurcation and Chaos, 08
N. Masuda, K. Aihara (2002)
Cryptosystems with discretized chaotic mapsIEEE Transactions on Circuits and Systems I-regular Papers, 49
J. Fridrich (1997)
Image encryption based on chaotic maps1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, 2
Jun Peng, Ming-ying You, Zhiming Yang, Shangzhu Jin (2007)
Research on a Block Encryption Cipher Based on Chaotic Dynamical SystemThird International Conference on Natural Computation (ICNC 2007), 5
D. Socek, Shujun Li, S. Magliveras, B. Furht (2005)
Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image EncryptionFirst International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05)
F. Muhaya, M. Usama, M. Khan (2009)
Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption
(2011)
Cyber journals: Multidisciplinary journals in science and technology
Zahra Parvin, Hadi Seyedarabi, M. Shamsi (2014)
A new secure and sensitive image encryption scheme based on new substitution with chaotic functionMultimedia Tools and Applications, 75
Satellite images have key features such as; large data size, strong correlation between adjacent pixels and high redundancy. Unfortunately, traditional operation modes used to implement the Advanced Encryption Standard (AES) encrypt data without taking into account these specific image features. As a result, the traditional modes are not suitable for image encryption. In this paper, we present a robust satellite image encryption scheme based on discretized chaotic maps and AES. The discretized chaotic maps are used to achieve a confusion and key generation in order to improve the performance of security, especially the sensitivity to plain image. The simulation results show that the proposed technique presents attractive features, including a high level of security, large key space with improved sensitivities to key and plain image.
Automatic Control and Computer Sciences – Springer Journals
Published: Sep 16, 2020
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.