Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 536930, 21 pages
http://dx.doi.org/10.1155/2014/536930
Research Article

A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map

1Software Technology and Management Center (Softam), Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia
2Center for Artificial Intelligence Technology (CAIT), Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia

Received 30 April 2014; Accepted 15 July 2014; Published 28 August 2014

Academic Editor: Iftikhar Ahmad

Copyright © 2014 Ali Soleymani et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [12 citations]

The following is the list of published articles that have cited the current article.

  • Marwa M. Eid, and Mohamed A. Mohamed, “A secure multimodal authentication system based on chaos cryptography and fuzzy fusion of iris and face,” 2017 Intl Conf on Advanced Control Circuits Systems (ACCS) Systems & 2017 Intl Conf on New Paradigms in Electronics & Information Technology (PEIT), pp. 163–171, . View at Publisher · View at Google Scholar
  • Ahmed M. Elshamy, M. A. Abdelghany, Ahmad Q. Alhamad, Hesham F. A. Hamed, Hamdy M. Kelash, and Aziza I. Hussein, “Secure Implementation for Video Streams Based on Fully and Permutation Encryption Techniques,” 2017 International Conference on Computer and Applications (ICCA), pp. 50–55, . View at Publisher · View at Google Scholar
  • Kapil Mishra, and Ravi Saharan, “Image encryption utilizing lossy image compression,” 2017 International Conference on Computer, Communications and Electronics (Comptelix), pp. 494–500, . View at Publisher · View at Google Scholar
  • Marwa M. Eid, and Mohamed A. Mohamed, “Advanced face recognition system using chaos cryptography and haar wavelet,” 2017 12th International Conference on Computer Engineering and Systems (ICCES), pp. 422–429, . View at Publisher · View at Google Scholar
  • Yohan Suryanto, Suryadi, and Kalamullah Ramli, “Chaos properties of the Chaotic Permutation generated by Multi Circular Shrinking and Expanding Movement,” 2015 International Conference on Quality in Research (QiR), pp. 65–68, . View at Publisher · View at Google Scholar
  • Nehal A. Mohamed, Mostafa A. El-Azeim, Alaa Zaghloul, and Ahmed A. Abd El-Latif, “Image encryption scheme for secure digital images based on 3D cat map and Turing machine,” 2015 7th International Conference of Soft Computing and Pattern Recognition (SoCPaR), pp. 230–234, . View at Publisher · View at Google Scholar
  • Ankur Khare, Piyush Shukla, Murtaza Rizvi, and Shalini Stalin, “An Intelligent and Fast Chaotic Encryption Using Digital Logic Circuits for Ad-Hoc and Ubiquitous Computing,” Entropy, vol. 18, no. 5, pp. 201, 2016. View at Publisher · View at Google Scholar
  • Yohan Suryanto, Suryadi, and Kalamullah Ramli, “A new image encryption using color scrambling based on chaotic permutation multiple circular shrinking and expanding,” Multimedia Tools and Applications, 2016. View at Publisher · View at Google Scholar
  • Deepaknath Tandur, Sheela, and Suresh, “Performance evaluation of modified henon map in image encryption,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10063, pp. 225–240, 2016. View at Publisher · View at Google Scholar
  • Chunlei Fan, and Qun Ding, “A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform,” Entropy, vol. 20, no. 6, pp. 445, 2018. View at Publisher · View at Google Scholar
  • Shalini Stalin, Priti Maheshwary, Piyush Kumar Shukla, Akhilesh Tiwari, and Ankur Khare, “Fast Chaotic Encryption Using Circuits for Mobile and Cloud Computing,” Soft-Computing-Based Nonlinear Control Systems Design, pp. 252–277, 2018. View at Publisher · View at Google Scholar
  • Shilpa P. Metkar, and Sanket Pandurang Devade, “Image encryption technique for improvement of image security,” Advances in Intelligent Systems and Computing, vol. 696, pp. 671–682, 2018. View at Publisher · View at Google Scholar