186
Views
22
CrossRef citations to date
0
Altmetric
Articles

Chaotic Image Encryption with Hash Keying as Key Generator

&

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Bhaskar Panna, Sumit Kumar & Rajib Kumar Jha. (2019) Image Encryption Based on Block-wise Fractional Fourier Transform with Wavelet Transform. IETE Technical Review 36:6, pages 600-613.
Read now

Articles from other publishers (21)

Kumar D, Sudha V K & Ranjithkumar R. (2022) A one-round medical image encryption algorithm based on a combined chaotic key generator. Medical & Biological Engineering & Computing 61:1, pages 205-227.
Crossref
P Naga SRİNİVASU, Norita NORWAWİ, Shanmuk Srinivas AMİRİPALLİ & P DEEPALAKSHMİ. (2022) Secured Compression for 2D Medical Images Through the Manifold and Fuzzy Trapezoidal Correlation Function. Gazi University Journal of Science 35:4, pages 1372-1391.
Crossref
Houxin She & Chaofeng Li. (2022) Effects of centrifugal stiffening and spin softening on nonlinear modal characteristics of cyclic blades with impact–friction coupling. Nonlinear Dynamics.
Crossref
Hayder Natiq, Nadia M. G. Al-Saidi, Suzan J. Obaiys, Mohammed Najah Mahdi & Alaa Kadhim Farhan. (2022) Image Encryption Based on Local Fractional Derivative Complex Logistic Map. Symmetry 14:9, pages 1874.
Crossref
P. Sathiyamurthi & S. Ramakrishnan. (2022) Speech encryption using hybrid-hyper chaotic system and binary masking technique. Multimedia Tools and Applications 81:5, pages 6331-6349.
Crossref
Hira Nazir, Imran Sarwar Bajwa, Saima Abdullah, Rafaqut Kazmi & Muhammad Samiullah. (2022) A Color Image Encryption Scheme Combining Hyperchaos and Genetic Codes. IEEE Access 10, pages 14480-14495.
Crossref
Lazaros Moysis, Ioannis Kafetzis, Aleksandra Tutueva, Denis Butusov & Christos Volos. 2022. Cybersecurity. Cybersecurity 157 191 .
Heping Wen, Jiajun Xu, Yunlong Liao, Ruiting Chen, Danze Shen, Lifei Wen, Yulin Shi, Qin Lin, Zhonghao Liang, Sihang Zhang, Yuxuan Liu, Ailin Huo, Tong Li, Chang Cai, Jiaqian Wen & Chongfu Zhang. (2021) A Security-Enhanced Image Communication Scheme Using Cellular Neural Network. Entropy 23:8, pages 1000.
Crossref
Hongyue Xiang & Lingfeng Liu. (2021) A new perturbation-feedback hybrid control method for reducing the dynamic degradation of digital chaotic systems and its application in image encryption. Multimedia Tools and Applications 80:13, pages 19237-19261.
Crossref
Chih-Min Lin, Duc-Hung Pham & Tuan-Tu Huynh. (2021) Synchronization of Chaotic System Using a Brain-Imitated Neural Network Controller and Its Applications for Secure Communications. IEEE Access 9, pages 75923-75944.
Crossref
R. Ashwin Kumar, T. Avinash, Nithya Chidambaram & Amirtharajan Rengarajan. 2021. Inventive Communication and Computational Technologies. Inventive Communication and Computational Technologies 487 496 .
Ajay Kakkar. (2020) A survey on secure communication techniques for 5G wireless heterogeneous networks. Information Fusion 62, pages 89-109.
Crossref
P. Sathiyamurthi & S. Ramakrishnan. (2020) Speech encryption algorithm using FFT and 3D-Lorenz–logistic chaotic map. Multimedia Tools and Applications 79:25-26, pages 17817-17835.
Crossref
K. Shankar, S.K. Lakshmanaprabu, Deepak Gupta, Ashish Khanna & Victor Hugo C. Albuquerque. (2018) Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience 32:4.
Crossref
F. J. Farsana & K. Gopakumar. (2020) Speech Encryption Algorithm Based on Nonorthogonal Quantum State with Hyperchaotic Keystreams. Advances in Mathematical Physics 2020, pages 1-12.
Crossref
Muhammad Samiullah, Waqar Aslam, Hira Nazir, M. Ikramullah Lali, Basit Shahzad, Muhammad Rafiq Mufti & Humaira Afzal. (2020) An Image Encryption Scheme Based on DNA Computing and Multiple Chaotic Systems. IEEE Access 8, pages 25650-25663.
Crossref
Tao Li, Baoxiang Du & Xiaowen Liang. (2020) Image Encryption Algorithm Based on Logistic and Two-Dimensional Lorenz. IEEE Access 8, pages 13792-13805.
Crossref
Sumit Kumar, Bhaskar Panna & Rajib Kumar Jha. (2019) Medical image encryption using fractional discrete cosine transform with chaotic function. Medical & Biological Engineering & Computing 57:11, pages 2517-2533.
Crossref
T. Gopalakrishnan & S. Ramakrishnan. (2019) Image Encryption Using Hyper-chaotic Map for Permutation and Diffusion by Multiple Hyper-chaotic Maps. Wireless Personal Communications 109:1, pages 437-454.
Crossref
Mourad Lahdir, Hamid Hamiche, Sarah Kassim, Mohamed Tahanout, Karim Kemih & Sid-Ali Addouche. (2019) A novel robust compression-encryption of images based on SPIHT coding and fractional-order discrete-time chaotic system. Optics & Laser Technology 109, pages 534-546.
Crossref
Sultan Almuhammadi & Ahmad Amro. (2017) Double-Hashing Operation Mode for Encryption. Double-Hashing Operation Mode for Encryption.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.