Table of Contents Author Guidelines Submit a Manuscript
Abstract and Applied Analysis
Volume 2013 (2013), Article ID 384067, 8 pages
Research Article

Chaotic Image Encryption Algorithm Based on Circulant Operation

1College of Science, Guangdong Ocean University, Zhanjiang 524088, China
2Department of Electronic Engineering, City University of Hong Kong, 83 Tat Chee Avenue, Kowloon Tong, Hong Kong

Received 19 May 2013; Revised 19 June 2013; Accepted 19 June 2013

Academic Editor: Luca Guerrini

Copyright © 2013 Xiaoling Huang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [6 citations]

The following is the list of published articles that have cited the current article.

  • Jin-jiang Yao, and Zhao-lin Jiang, “The Determinants, Inverses, Norm, and Spread of Skew Circulant Type Matrices Involving Any Continuous Lucas Numbers,” Journal of Applied Mathematics, vol. 2014, pp. 1–10, 2014. View at Publisher · View at Google Scholar
  • Juan Li, Zhaolin Jiang, and Fuliang Lu, “Determinants, Norms, and the Spread of Circulant Matrices with Tribonacci and Generalized Lucas Numbers,” Abstract and Applied Analysis, vol. 2014, pp. 1–9, 2014. View at Publisher · View at Google Scholar
  • Padmapriya Praveenkumar, Rengarajan Amirtharajan, K. Thenmozhi, and John Bosco Balaguru Rayappan, “Pixel scattering matrix formalism for image encryption-A key scheduled substitution and diffusion approach,” Aeu-International Journal Of Electronics And Communications, vol. 69, no. 2, pp. 562–572, 2015. View at Publisher · View at Google Scholar
  • Guodong Ye, and Xiaoling Huang, “A secure image encryption algorithm based on chaotic maps and SHA-3,” Security and Communication Networks, 2016. View at Publisher · View at Google Scholar
  • Anas Altaleb, Muhammad Sarwar Saeed, Iqtadar Hussain, and Muhammad Aslam, “An algorithm for the construction of substitution box for block ciphers based on projective general linear group,” AIP Advances, vol. 7, no. 3, pp. 035116, 2017. View at Publisher · View at Google Scholar
  • Sridevi, Philominathan, Padmapriya Praveenkumar, John Bosco Balaguru Rayappan, and Rengarajan Amirtharajan, “Logistic and standard coupled mapping on pre and post shuffled images: A method of image encryption,” Asian Journal of Scientific Research, vol. 10, no. 1, pp. 10–23, 2017. View at Publisher · View at Google Scholar