Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 283639, 11 pages
http://dx.doi.org/10.1155/2014/283639
Research Article

Novel Image Encryption Scheme Based on Chebyshev Polynomial and Duffing Map

Faculty of Mathematics and Informatics, Konstantin Preslavski University of Shumen, 9712 Shumen, Bulgaria

Received 10 December 2013; Accepted 4 March 2014; Published 26 March 2014

Academic Editors: T. Cao, M. K. Khan, and F. Yu

Copyright © 2014 Borislav Stoyanov and Krasimir Kordov. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [22 citations]

The following is the list of published articles that have cited the current article.

  • Nada Hamad, Mizanur Rahman, and Saiful Islam, “Novel remote authentication protocol using heart-signals with chaos cryptography,” 2017 International Conference on Informatics, Health & Technology (ICIHT), pp. 1–7, . View at Publisher · View at Google Scholar
  • Zhongeng Wang, and Shoufa Chen, “Performance comparison of image block compressive sensing based on chaotic sensing matrix using different basis matrices,” 2017 2nd International Conference on Image, Vision and Computing (ICIVC), pp. 620–623, . View at Publisher · View at Google Scholar
  • Dina RiadhAlshibani, and Samar AmilQassir, “Chaos-based image encoding using Elementary Cellular Automata,” 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), pp. 28–33, . View at Publisher · View at Google Scholar
  • Radu Boriga, Ana Cristina Dăscălescu, and Adrian-Viorel Diaconu, “A New One-Dimensional Chaotic Map and Its Use in a Novel Real-Time Image Encryption Scheme,” Advances in Multimedia, vol. 2014, pp. 1–15, 2014. View at Publisher · View at Google Scholar
  • Borislav Stoyanov, “Pseudo-random bit generation algorithm based on Chebyshev polynomial and Tinkerbell map,” Applied Mathematical Sciences, vol. 8, no. 125-128, pp. 6205–6210, 2014. View at Publisher · View at Google Scholar
  • Kordov, “Modified Chebyshev map based pseudo-random bit generator,” AIP Conference Proceedings, vol. 1629, pp. 432–436, 2014. View at Publisher · View at Google Scholar
  • B. P. Stoyanov, and B. P. Stoyanov, “Using Circle Map in Pseudorandom Bit Generation,” Application Of Mathematics In Technical And Natural Sciences (Amitans '14), vol. 1629, pp. 460–463, 2014. View at Publisher · View at Google Scholar
  • Borislav Stoyanov, and Krasimir Kordov, “Image Encryption Using Chebyshev Map and Rotation Equation,” Entropy, vol. 17, no. 4, pp. 2117–2139, 2015. View at Publisher · View at Google Scholar
  • Shuai Ren, Tao Zhang, and Fangxia Shi, “Characteristic analysis of carrier based on the filtering and a multi-wavelet method for the information hiding,” Discrete and Continuous Dynamical Systems - Series S, vol. 8, no. 6, pp. 1291–1299, 2015. View at Publisher · View at Google Scholar
  • Krasimir Kordov, “Modified pseudo-random bit generation scheme based on two circle maps and XOR function,” Applied Mathematical Sciences, vol. 9, no. 1-4, pp. 129–135, 2015. View at Publisher · View at Google Scholar
  • Dimo Malchev, and Ilhan Ibryam, “Construction of pseudorandom binary sequences using chaotic maps,” Applied Mathematical Sciences, vol. 9, no. 77-80, pp. 3847–3853, 2015. View at Publisher · View at Google Scholar
  • Chanil Pak, and Lilian Huang, “A new color image encryption using combination of the 1D chaotic map,” Signal Processing, vol. 138, pp. 129–137, 2017. View at Publisher · View at Google Scholar
  • Zhongpeng Wang, and Weiwei Qiu, “Secure Image Transmission over DFT-precoded OFDM-VLC systems based on Chebyshev Chaos scrambling,” Optics Communications, vol. 397, pp. 84–90, 2017. View at Publisher · View at Google Scholar
  • Borislav Stoyanov, Krzysztof Szczypiorski, and Krasimir Kordov, “Yet Another Pseudorandom Number Generator,” International Journal of Electronics and Telecommunications, vol. 63, no. 2, pp. 195–199, 2017. View at Publisher · View at Google Scholar
  • Leonard Novosel, and Gordan Šišul, “Performance evaluation of chaotic spreading sequences on software-defined radio,” EURASIP Journal on Wireless Communications and Networking, vol. 2017, no. 1, 2017. View at Publisher · View at Google Scholar
  • Yonggang Su, Chen Tang, Biyuan Li, Xia Chen, Wenjun Xu, and Yuanxue Cai, “Single-lens Fourier-transform-based optical color image encryption using dual two-dimensional chaotic maps and the Fresnel transform,” Applied Optics, vol. 56, no. 3, pp. 498, 2017. View at Publisher · View at Google Scholar
  • Zhenyang Chen, Xiujing Han, and Qinsheng Bi, “Complex bursting oscillation structures in a two-dimensional non-autonomous discrete system,” Lixue Xuebao/Chinese Journal of Theoretical and Applied Mechanics, vol. 49, no. 1, pp. 165–174, 2017. View at Publisher · View at Google Scholar
  • Borislav Stoyanov, and Krasimir Kordov, “Least significant bit steganography using hitzl-zele chaotic map,” International Journal of Electronics and Telecommunications, vol. 63, no. 4, pp. 417–422, 2017. View at Publisher · View at Google Scholar
  • Zhongpeng Wang, Ziqing Wang, and Shoufa Chen, “Encrypted image transmission in OFDM-based VLC systems using symbol scrambling and chaotic DFT precoding,” Optics Communications, 2018. View at Publisher · View at Google Scholar
  • Shuqin Zhu, Congxu Zhu, and Wenhong Wang, “A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256,” Entropy, vol. 20, no. 9, pp. 716, 2018. View at Publisher · View at Google Scholar
  • Linqing Huang, Shuting Cai, Mingqing Xiao, and Xiaoming Xiong, “A Simple Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and Diffusion,” Entropy, vol. 20, no. 7, pp. 535, 2018. View at Publisher · View at Google Scholar
  • Hossam Diab, and Aly M. El-semary, “Secure image cryptosystem with unique key streams via hyper-chaotic system,” Signal Processing, vol. 142, pp. 53–68, 2018. View at Publisher · View at Google Scholar