Access the full text.
Sign up today, get DeepDyve free for 14 days.
R. Enayatifar, A. Abdullah, Malrey Lee (2013)
A weighted discrete imperialist competitive algorithm (WDICA) combined with chaotic map for image encryptionOptics and Lasers in Engineering, 51
Musheer Ahmad, Omar Farooq (2011)
Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform
Khadijeh Talarposhti, Mehrzad Jamei (2016)
A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic mapOptics and Lasers in Engineering, 81
Wenying Wen (2015)
Security analysis of a color image encryption scheme based on skew tent map and hyper chaotic system of 6th-order CNN against chosen-plaintext attackMultimedia Tools and Applications, 75
Xiaoqiang Zhang, X. Wang, Yuhu Cheng (2015)
Image Encryption Based on a Genetic Algorithm and a Chaotic SystemIEICE Trans. Commun., 98-B
M. Usama, M. Khan, K. Alghathbar, Changhoon Lee (2010)
Chaos-based secure satellite imagery cryptosystemComput. Math. Appl., 60
Xiaoyun Wang, Y. Yin, Hongbo Yu (2005)
Finding Collisions in the Full SHA-1
Manjit Kaur, Vijay Kumar (2018)
Colour image encryption technique using differential evolution in non-subsampled contourlet transform domainIET Image Process., 12
Xiao-ling Huang, G. Ye, Huajin Chai, Ou Xie (2015)
Compression and encryption for remote sensing image using chaotic systemSecur. Commun. Networks, 8
N. Rawat, Byoungho Kim, R. Kumar (2016)
Fast digital image encryption based on compressive sensing using structurally random matrices and Arnold transform techniqueOptik, 127
Manjit Kaur, Vijay Kumar (2018)
Efficient image encryption method based on improved Lorenz chaotic systemElectronics Letters, 54
E. Lorenz (1963)
Deterministic nonperiodic flowJournal of the Atmospheric Sciences, 20
(2015)
A novel hybridmulti-objective immune algorithmwith adaptive differential evolution
F. Muhaya (2013)
Chaotic and AES cryptosystem for satellite imageryTelecommunication Systems, 52
Xiaoqiang Zhang, Guiliang Zhu, Shilong Ma (2012)
Remote-sensing image encryption in hybrid domainsOptics Communications, 285
Atieh Bakhshandeh, Ziba Eslami (2013)
An authenticated image encryption scheme based on chaotic maps and memory cellular automataOptics and Lasers in Engineering, 51
Benyamin Norouzi, S. Mirzakuchaki, Seyed Seyedzadeh, M. Mosavi (2012)
A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion processMultimedia Tools and Applications, 71
Qiuzhen Lin, Jianyong Chen (2013)
A novel micro-population immune multiobjective optimization algorithmComput. Oper. Res., 40
M Ahmad, O Farooq (2011)
High Performance Architecture and Grid Computing
Ye Zhang, Biao Xu, Nanrun Zhou (2017)
A novel image compression–encryption hybrid algorithm based on the analysis sparse representationOptics Communications, 392
N. Sreelaja, G. Pai (2012)
Stream cipher for binary image encryption using Ant Colony Optimization based key generationAppl. Soft Comput., 12
Akram Belazi, A. El-latif, S. Belghith (2016)
A novel image encryption scheme based on substitution-permutation network and chaosSignal Process., 128
Manjit Kaur, Vijay Kumar (2018)
Fourier-Mellin moment-based intertwining map for image encryptionModern Physics Letters B, 32
M. Ghebleh, A. Kanso, H. Noura (2014)
An image encryption scheme based on irregularly decimated chaotic mapsSignal Process. Image Commun., 29
G. Ye, Xiao-ling Huang (2015)
A novel block chaotic encryption scheme for remote sensing imageMultimedia Tools and Applications, 75
N. Sharma, I. Saini, Akash Yadav, Phool Singh (2017)
Phase-Image Encryption Based on 3D-Lorenz Chaotic System and Double Random Phase Encoding3D Research, 8
R. Enayatifar, A. Abdullah, I. Isnin (2014)
Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequenceOptics and Lasers in Engineering, 56
A. Abdullah, R. Enayatifar, Malrey Lee (2012)
A hybrid genetic algorithm and chaotic function model for image encryptionAeu-international Journal of Electronics and Communications, 66
C. Shannon (1949)
Communication theory of secrecy systemsBell Syst. Tech. J., 28
Lilian Huang, Donghai Shi, Jie Gao (2016)
The Design and Its Application in Secure Communication and Image Encryption of a New Lorenz-Like System with Varying ParameterMathematical Problems in Engineering, 2016
Yuansheng Liu, L. Zhang, Jia Wang, Yushu Zhang, Kwok-wo Wong (2015)
Chosen-plaintext attack of an image encryption scheme based on modified permutation–diffusion structureNonlinear Dynamics, 84
Chengqing Li (2015)
Cracking a hierarchical chaotic image encryption algorithm based on permutationArXiv, abs/1505.00335
Wei Zhang, Kwok-wo Wong, Hai Yu, Zhiliang Zhu (2013)
An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusionCommun. Nonlinear Sci. Numer. Simul., 18
Bhaskar Mondal, T. Mandal (2017)
A light weight secure image encryption scheme based on chaos & DNA computingJ. King Saud Univ. Comput. Inf. Sci., 29
T. Sivakumar, R. Venkatesan (2015)
A Novel Image Encryption Using Calligraphy Based Scan Method and Random NumberKSII Trans. Internet Inf. Syst., 9
F. El-Samie, H. Ahmed, Ibrahim Elashry, Mai Shahieen, O. Faragallah, El-Sayed El-Rabaie, S. Alshebeili (2013)
Image Encryption: A Communication Perspective
Lilian Huang, Xiaoyang Wang, Guanghui Sun (2010)
Design and circuit simulation of the new Lorenz chaotic system2010 3rd International Symposium on Systems and Control in Aeronautics and Astronautics
K. Deb, S. Agrawal, Amrit Pratap, T. Meyarivan (2002)
A fast and elitist multiobjective genetic algorithm: NSGA-IIIEEE Trans. Evol. Comput., 6
The main challenge for Lorenz chaotic system-based image encryption techniques is parameter sensitivity and resistance against attacks. To resolve these issues, a modified image encryption technique based on secure hash algorithm (SHA-3) and adaptive differential evolution (ADE) is proposed. In the proposed technique, ADE is used to optimize the input parameters of Lorenz chaotic system. SHA-3 is used to generate secret key based on the input image. The optimized parameters and external secret keys are used to generate initial values for Lorenz chaotic system that make it sensitive toward input image and provide resistance against both known-plaintext and known-ciphertext attacks. The proposed technique is compared with five well-known image encryption techniques over four color images. The experimental results reveal that the proposed technique outperforms existing techniques in terms of security and quality measures. The noise and enhancement attacks are also applied to test the robustness of proposed technique.
Arabian Journal for Science and Engineering – Springer Journals
Published: Jun 6, 2018
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.