SCIRP Mobile Website
Paper Submission

Why Us? >>

  • - Open Access
  • - Peer-reviewed
  • - Rapid publication
  • - Lifetime hosting
  • - Free indexing service
  • - Free promotion service
  • - More citations
  • - Search engine friendly

Free SCIRP Newsletters>>

Add your e-mail address to receive free newsletters from SCIRP.

 

Contact Us >>

Article citations

More>>

Y. Wanga, K.-W. Wong, X. F. Liao and G. R. Chen, “A New Chaos-Based Fast Image Encryption Algorithm,” Applied Soft Computing, Vol. 11, No. 1, pp. 514-522, 2011 doi:10.1016/j.asoc.2009.12.011

has been cited by the following article:

  • TITLE: New Approach for Fast Color Image Encryption Using Chaotic Map

    AUTHORS: Kamlesh Gupta, Sanjay Silakari

    KEYWORDS: Chaotic Map, 3D Cat Map, Standard Map, Confusion and Diffusion

    JOURNAL NAME: Journal of Information Security, Vol.2 No.4, October 24, 2011

    ABSTRACT: Image encryption using chaotic maps has been established a great way. The study shows that a number of functional architecture has already been proposed that utilize the process of diffusion and confusion. However, permutation and diffusion are considered as two separate stages, both requiring image-scanning to obtain pixel values. If these two stages are mutual, the duplicate scanning effort can be minimized and the encryption can be accelerated. This paper presents a technique which replaces the traditional preprocessing complex system and utilizes the basic operations like confusion, diffusion which provide same or better encryption using cascading of 3D standard and 3D cat map. We generate diffusion template using 3D standard map and rotate image by using vertically and horizontally red and green plane of the input image. We then shuffle the red, green, and blue plane by using 3D Cat map and standard map. Finally the Image is encrypted by performing XOR operation on the shuffled image and diffusion template. Theoretical analyses and computer simulations on the basis of Key space Analysis, statistical analysis, histogram analysis, Information entropy analysis, Correlation Analysis and Differential Analysis confirm that the new algorithm that minimizes the possibility of brute force attack for decryption and very fast for practical image encryption