A novel image encryption scheme based on Brownian motion and PWLCM chaotic system

2013 ◽  
Vol 75 (1-2) ◽  
pp. 345-353 ◽  
Author(s):  
Xingyuan Wang ◽  
Dahai Xu
2017 ◽  
Vol 26 (2) ◽  
pp. 020504 ◽  
Author(s):  
Xiu-Li Chai ◽  
Zhi-Hua Gan ◽  
Ke Yuan ◽  
Yang Lu ◽  
Yi-Ran Chen

2014 ◽  
Vol 79 (2) ◽  
pp. 1511-1518 ◽  
Author(s):  
Congxu Zhu ◽  
Siyuan Xu ◽  
Yuping Hu ◽  
Kehui Sun

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 46400-46416 ◽  
Author(s):  
Lidong Liu ◽  
Dan Wang ◽  
Yuhang Lei

Entropy ◽  
2019 ◽  
Vol 21 (9) ◽  
pp. 819 ◽  
Author(s):  
Yaqin Xie ◽  
Jiayin Yu ◽  
Shiyu Guo ◽  
Qun Ding ◽  
Erfu Wang

In this paper, a new three-dimensional chaotic system is proposed for image encryption. The core of the encryption algorithm is the combination of chaotic system and compressed sensing, which can complete image encryption and compression at the same time. The Lyapunov exponent, bifurcation diagram and complexity of the new three-dimensional chaotic system are analyzed. The performance analysis shows that the chaotic system has two positive Lyapunov exponents and high complexity. In the encryption scheme, a new chaotic system is used as the measurement matrix for compressed sensing, and Arnold is used to scrambling the image further. The proposed method has better reconfiguration ability in the compressible range of the algorithm compared with other methods. The experimental results show that the proposed encryption scheme has good encryption effect and image compression capability.


2015 ◽  
Vol 39 ◽  
pp. 151-158 ◽  
Author(s):  
Rabei Bechikh ◽  
Houcemeddine Hermassi ◽  
Ahmed A. Abd El-Latif ◽  
Rhouma Rhouma ◽  
Safya Belghith

2014 ◽  
Vol 69 (1-2) ◽  
pp. 61-69 ◽  
Author(s):  
Xing-Yuan Wang ◽  
Xue-Mei Bao

In this paper, we propose a novel selective image encryption scheme using a one-way coupled map lattice (CML) consisting of logistic maps and a selector constructed by two variants of a cyclic shift register (VCSR). The initial conditions and the coupling constant of CML in our scheme are influenced by all the contents of the plain image. Moreover, the selector is closely related to the nonencrypted part of the plain image. In addition, we select only a portion of image data to encrypt via a wheel-switch scheme governed by the selector. Users can select an appropriate proportion to encrypt the plain image for their different demands of security and efficiency. Experimental results and theoretical analysis show that the cryptosystem is effective and can resist various typical attacks.


Optik ◽  
2016 ◽  
Vol 127 (15) ◽  
pp. 5812-5819 ◽  
Author(s):  
Hongjun Liu ◽  
Abdurahman Kadir ◽  
Yangling Li

Sign in / Sign up

Export Citation Format

Share Document