26
Views
5
CrossRef citations to date
0
Altmetric
Articles

A chaotic image cryptosystem based on Toeplitz and Hankel matrices

Pages 266-273 | Published online: 18 Jul 2013

REFERENCES

  • Bourbakis, N. G. and Alexopoulos, C. Picture data encryption using SCAN pattern. Patt. Recogn., 1992, 25, 567–581.
  • Baptista, M. S. Cryptography with chaos. Phys. Lett. A, 1998, 240A, 50–54.
  • Scharinger, J. Fast encryption of image data using chaotic Kolmogorov flows. J. Electron. Image, 1998, 7, 318–325.
  • Qi, D. X., Zhou, J. C. and Han, X. Y. A new class of scrambling transformation and its application in the image information covering. Sci. China Ser. E, 2000, 43E, 304–312.
  • Chang, C. C., Hwang, M .S. and Chen, T. S. A new encryption algorithm for image cryptosystems. J. Syst. Software, 2001, 58, 83–91.
  • Li, W. H. and Yuan, Y. A leak and its remedy in JPEG image encryption. Int. J. Comput. Math., 2007, 84, 1367–1378.
  • Matthews, R. On the derivation of a chaotic encryption algorithm. Cryptrologia, 1989, 13, 29–42.
  • Pareek, N. K., Patidar, V. and Sud, K. K. Image encryption using chaotic logistic map. Image Vision Comput., 2006, 24, 926–934.
  • Pareek, N. K., Patidar. V. and Sud, K. K. Cryptography using multiple one-dimensional chaotic maps. Commun. Nonlinear Sci. Numer. Simul., 2005, 10, 715–723.
  • Behnia, S., Akhshani, A., Mahmodi, H. and Akhavan, A. A novel algorithm for image encryption based on mixture of chaotic maps. Chaos Solitons Fractals, 2008, 35, 408–419.
  • Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H. and Akhavan, A. A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Phys. Lett. A, 2007, 366A, 391–396.
  • Fridrich, J. Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos, 1998, 8, 1259–1284.
  • Rhouma, R. and Belghith, S. Cryptanalysis of new image encryption algorithm based on hyper-chaos. Phys. Lett. A, 2008, 372A, 5973–5978.
  • Gao, T. G. and Chen, Z. Q. Image encryption based on a new total shuffling algorithm. Chaos Solitons Fractals, 2008, 38, 213–220.
  • Ye, G. D., Huang, X. L. and Zhu, C. Q. Image encryption algorithm of double scrambling based on ASCII code of matrix element, Proc. Int. Conf. on Computational intelligence and security: CIS’2007, Harbin, China, September 2007, IEEE, pp. 843–847.
  • Kwok, H. S. and Tang, W. K. S. A fast image encryption system based on chaotic maps with finite precision representation. Chaos Solitons Fractals, 2007, 32, 1518–1529.
  • Schneier, B. Applied Cryptography: Protocols, Algirithms and Source Code in C, 2nd edition, 1995 (John Wiey & Sons, New York).
  • Chan, R. H. and Ng, M. K. Conjugate gradient methods for toeplitz systems. SIAM Rev., 1996, 38, 427–482.
  • Otto, T. Zur Theorie der quadratischen und bilinearen Formen von unendlichvielen Veränderlichen I. Teil: Theorie L-Formen Math. Ann., 1911, 70, 351–376.
  • Bini, D. and Favati, P. On a matrix algebra related to the discrete Hartley transform. SIAM J Matrix Anal. Appl., 1993, 14, 500–507.
  • Chen, G. R. and Ueta, T. Yet another chaotic attractor. Int. J. Bifurc. Chaos, 1999, 9, 1465–1466.
  • Lü, J. L. and Chen, G. R. A new chaotic attractor coined. Int. J. Bifurc. Chaos, 2002, 12, 659–661.
  • Tong, X. J. and Cui, M. G. Image encryption with compound chaotic sequence cihper shifting dynamically. Image Vision Comput., 2008, 26, 843–550.
  • Mao, Y. B., Chen, G. and Lian, S. G. A novel fast image encryption scheme based on the 3D chaotic baker map. Int. J. Bifurc. Chaos, 2004, 14, 3613–3624.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.