Affiliation:
1. School of Software, Nanchang University, Nanchang 330031, China
Abstract
Chaos has been one of the most effective cryptographic sources since it was first used in image-encryption algorithms. This paper closely examines the development process of chaos-based image-encryption algorithms from various angles, including symmetric and asymmetric algorithms, block ciphers and stream ciphers, and integration with other technologies. The unique attributes of chaos, such as sensitivity to initial conditions, topological transitivity, and pseudo-randomness, are conducive to cross-referencing with other disciplines and improving image-encryption methods. Additionally, this paper covers practical application scenarios and current challenges of chaotic image encryption, thereby encouraging researchers to continue developing and complementing existing situations, and may also serve as a basis of future development prospects for chaos-based image encryption.
Funder
National Natural Science Foundation of China
Outstanding Youth Foundation of Jiangxi Province
Subject
General Mathematics,Engineering (miscellaneous),Computer Science (miscellaneous)
Reference204 articles.
1. Deterministic nonperiodic flow;Lorenz;J. Atmos. Sci.,1963
2. Li, T.-Y., and Yorke, J.A. (2004). The Theory of Chaotic Attractors, Springer.
3. Simple mathematical models with very complicated dynamics;May;Nature,1976
4. A mathematical theory of communication;Shannon;Bell Syst. Tech. J.,1948
5. Communication theory of secrecy systems;Shannon;Bell Syst. Tech. J.,1949
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献