A fast image encryption algorithm based on chaotic map
Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum a...
Ausführliche Beschreibung
Autor*in: |
Liu, Wenhao [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2016transfer abstract |
---|
Schlagwörter: |
---|
Umfang: |
11 |
---|
Übergeordnetes Werk: |
Enthalten in: Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel - Pratap Singh, Ajeet ELSEVIER, 2020, Amsterdam [u.a.] |
---|---|
Übergeordnetes Werk: |
volume:84 ; year:2016 ; pages:26-36 ; extent:11 |
Links: |
---|
DOI / URN: |
10.1016/j.optlaseng.2016.03.019 |
---|
Katalog-ID: |
ELV024198064 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | ELV024198064 | ||
003 | DE-627 | ||
005 | 20230625142425.0 | ||
007 | cr uuu---uuuuu | ||
008 | 180603s2016 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1016/j.optlaseng.2016.03.019 |2 doi | |
028 | 5 | 2 | |a GBVA2016003000018.pica |
035 | |a (DE-627)ELV024198064 | ||
035 | |a (ELSEVIER)S0143-8166(16)30017-3 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
082 | 0 | |a 530 | |
082 | 0 | 4 | |a 530 |q DE-600 |
082 | 0 | 4 | |a 620 |q VZ |
084 | |a 50.70 |2 bkl | ||
084 | |a 83.65 |2 bkl | ||
084 | |a 52.57 |2 bkl | ||
084 | |a 52.56 |2 bkl | ||
100 | 1 | |a Liu, Wenhao |e verfasserin |4 aut | |
245 | 1 | 0 | |a A fast image encryption algorithm based on chaotic map |
264 | 1 | |c 2016transfer abstract | |
300 | |a 11 | ||
336 | |a nicht spezifiziert |b zzz |2 rdacontent | ||
337 | |a nicht spezifiziert |b z |2 rdamedia | ||
338 | |a nicht spezifiziert |b zu |2 rdacarrier | ||
520 | |a Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. | ||
520 | |a Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. | ||
650 | 7 | |a Chaos |2 Elsevier | |
650 | 7 | |a Image encryption |2 Elsevier | |
650 | 7 | |a Close-loop modulation coupling model |2 Elsevier | |
650 | 7 | |a Chaotic shift transform |2 Elsevier | |
700 | 1 | |a Sun, Kehui |4 oth | |
700 | 1 | |a Zhu, Congxu |4 oth | |
773 | 0 | 8 | |i Enthalten in |n Elsevier Science |a Pratap Singh, Ajeet ELSEVIER |t Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel |d 2020 |g Amsterdam [u.a.] |w (DE-627)ELV004269535 |
773 | 1 | 8 | |g volume:84 |g year:2016 |g pages:26-36 |g extent:11 |
856 | 4 | 0 | |u https://doi.org/10.1016/j.optlaseng.2016.03.019 |3 Volltext |
912 | |a GBV_USEFLAG_U | ||
912 | |a GBV_ELV | ||
912 | |a SYSFLAG_U | ||
936 | b | k | |a 50.70 |j Energie: Allgemeines |q VZ |
936 | b | k | |a 83.65 |j Versorgungswirtschaft |q VZ |
936 | b | k | |a 52.57 |j Energiespeicherung |q VZ |
936 | b | k | |a 52.56 |j Regenerative Energieformen |j alternative Energieformen |q VZ |
951 | |a AR | ||
952 | |d 84 |j 2016 |h 26-36 |g 11 | ||
953 | |2 045F |a 530 |
author_variant |
w l wl |
---|---|
matchkey_str |
liuwenhaosunkehuizhucongxu:2016----:fsiaenrpinloihbs |
hierarchy_sort_str |
2016transfer abstract |
bklnumber |
50.70 83.65 52.57 52.56 |
publishDate |
2016 |
allfields |
10.1016/j.optlaseng.2016.03.019 doi GBVA2016003000018.pica (DE-627)ELV024198064 (ELSEVIER)S0143-8166(16)30017-3 DE-627 ger DE-627 rakwb eng 530 530 DE-600 620 VZ 50.70 bkl 83.65 bkl 52.57 bkl 52.56 bkl Liu, Wenhao verfasserin aut A fast image encryption algorithm based on chaotic map 2016transfer abstract 11 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. Chaos Elsevier Image encryption Elsevier Close-loop modulation coupling model Elsevier Chaotic shift transform Elsevier Sun, Kehui oth Zhu, Congxu oth Enthalten in Elsevier Science Pratap Singh, Ajeet ELSEVIER Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel 2020 Amsterdam [u.a.] (DE-627)ELV004269535 volume:84 year:2016 pages:26-36 extent:11 https://doi.org/10.1016/j.optlaseng.2016.03.019 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 50.70 Energie: Allgemeines VZ 83.65 Versorgungswirtschaft VZ 52.57 Energiespeicherung VZ 52.56 Regenerative Energieformen alternative Energieformen VZ AR 84 2016 26-36 11 045F 530 |
spelling |
10.1016/j.optlaseng.2016.03.019 doi GBVA2016003000018.pica (DE-627)ELV024198064 (ELSEVIER)S0143-8166(16)30017-3 DE-627 ger DE-627 rakwb eng 530 530 DE-600 620 VZ 50.70 bkl 83.65 bkl 52.57 bkl 52.56 bkl Liu, Wenhao verfasserin aut A fast image encryption algorithm based on chaotic map 2016transfer abstract 11 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. Chaos Elsevier Image encryption Elsevier Close-loop modulation coupling model Elsevier Chaotic shift transform Elsevier Sun, Kehui oth Zhu, Congxu oth Enthalten in Elsevier Science Pratap Singh, Ajeet ELSEVIER Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel 2020 Amsterdam [u.a.] (DE-627)ELV004269535 volume:84 year:2016 pages:26-36 extent:11 https://doi.org/10.1016/j.optlaseng.2016.03.019 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 50.70 Energie: Allgemeines VZ 83.65 Versorgungswirtschaft VZ 52.57 Energiespeicherung VZ 52.56 Regenerative Energieformen alternative Energieformen VZ AR 84 2016 26-36 11 045F 530 |
allfields_unstemmed |
10.1016/j.optlaseng.2016.03.019 doi GBVA2016003000018.pica (DE-627)ELV024198064 (ELSEVIER)S0143-8166(16)30017-3 DE-627 ger DE-627 rakwb eng 530 530 DE-600 620 VZ 50.70 bkl 83.65 bkl 52.57 bkl 52.56 bkl Liu, Wenhao verfasserin aut A fast image encryption algorithm based on chaotic map 2016transfer abstract 11 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. Chaos Elsevier Image encryption Elsevier Close-loop modulation coupling model Elsevier Chaotic shift transform Elsevier Sun, Kehui oth Zhu, Congxu oth Enthalten in Elsevier Science Pratap Singh, Ajeet ELSEVIER Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel 2020 Amsterdam [u.a.] (DE-627)ELV004269535 volume:84 year:2016 pages:26-36 extent:11 https://doi.org/10.1016/j.optlaseng.2016.03.019 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 50.70 Energie: Allgemeines VZ 83.65 Versorgungswirtschaft VZ 52.57 Energiespeicherung VZ 52.56 Regenerative Energieformen alternative Energieformen VZ AR 84 2016 26-36 11 045F 530 |
allfieldsGer |
10.1016/j.optlaseng.2016.03.019 doi GBVA2016003000018.pica (DE-627)ELV024198064 (ELSEVIER)S0143-8166(16)30017-3 DE-627 ger DE-627 rakwb eng 530 530 DE-600 620 VZ 50.70 bkl 83.65 bkl 52.57 bkl 52.56 bkl Liu, Wenhao verfasserin aut A fast image encryption algorithm based on chaotic map 2016transfer abstract 11 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. Chaos Elsevier Image encryption Elsevier Close-loop modulation coupling model Elsevier Chaotic shift transform Elsevier Sun, Kehui oth Zhu, Congxu oth Enthalten in Elsevier Science Pratap Singh, Ajeet ELSEVIER Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel 2020 Amsterdam [u.a.] (DE-627)ELV004269535 volume:84 year:2016 pages:26-36 extent:11 https://doi.org/10.1016/j.optlaseng.2016.03.019 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 50.70 Energie: Allgemeines VZ 83.65 Versorgungswirtschaft VZ 52.57 Energiespeicherung VZ 52.56 Regenerative Energieformen alternative Energieformen VZ AR 84 2016 26-36 11 045F 530 |
allfieldsSound |
10.1016/j.optlaseng.2016.03.019 doi GBVA2016003000018.pica (DE-627)ELV024198064 (ELSEVIER)S0143-8166(16)30017-3 DE-627 ger DE-627 rakwb eng 530 530 DE-600 620 VZ 50.70 bkl 83.65 bkl 52.57 bkl 52.56 bkl Liu, Wenhao verfasserin aut A fast image encryption algorithm based on chaotic map 2016transfer abstract 11 nicht spezifiziert zzz rdacontent nicht spezifiziert z rdamedia nicht spezifiziert zu rdacarrier Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. Chaos Elsevier Image encryption Elsevier Close-loop modulation coupling model Elsevier Chaotic shift transform Elsevier Sun, Kehui oth Zhu, Congxu oth Enthalten in Elsevier Science Pratap Singh, Ajeet ELSEVIER Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel 2020 Amsterdam [u.a.] (DE-627)ELV004269535 volume:84 year:2016 pages:26-36 extent:11 https://doi.org/10.1016/j.optlaseng.2016.03.019 Volltext GBV_USEFLAG_U GBV_ELV SYSFLAG_U 50.70 Energie: Allgemeines VZ 83.65 Versorgungswirtschaft VZ 52.57 Energiespeicherung VZ 52.56 Regenerative Energieformen alternative Energieformen VZ AR 84 2016 26-36 11 045F 530 |
language |
English |
source |
Enthalten in Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel Amsterdam [u.a.] volume:84 year:2016 pages:26-36 extent:11 |
sourceStr |
Enthalten in Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel Amsterdam [u.a.] volume:84 year:2016 pages:26-36 extent:11 |
format_phy_str_mv |
Article |
bklname |
Energie: Allgemeines Versorgungswirtschaft Energiespeicherung Regenerative Energieformen alternative Energieformen |
institution |
findex.gbv.de |
topic_facet |
Chaos Image encryption Close-loop modulation coupling model Chaotic shift transform |
dewey-raw |
530 |
isfreeaccess_bool |
false |
container_title |
Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel |
authorswithroles_txt_mv |
Liu, Wenhao @@aut@@ Sun, Kehui @@oth@@ Zhu, Congxu @@oth@@ |
publishDateDaySort_date |
2016-01-01T00:00:00Z |
hierarchy_top_id |
ELV004269535 |
dewey-sort |
3530 |
id |
ELV024198064 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV024198064</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625142425.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.optlaseng.2016.03.019</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2016003000018.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV024198064</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0143-8166(16)30017-3</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">530</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">530</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">50.70</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">83.65</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">52.57</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">52.56</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Liu, Wenhao</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A fast image encryption algorithm based on chaotic map</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">11</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Chaos</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Image encryption</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Close-loop modulation coupling model</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Chaotic shift transform</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sun, Kehui</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhu, Congxu</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science</subfield><subfield code="a">Pratap Singh, Ajeet ELSEVIER</subfield><subfield code="t">Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel</subfield><subfield code="d">2020</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV004269535</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:84</subfield><subfield code="g">year:2016</subfield><subfield code="g">pages:26-36</subfield><subfield code="g">extent:11</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.optlaseng.2016.03.019</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">50.70</subfield><subfield code="j">Energie: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">83.65</subfield><subfield code="j">Versorgungswirtschaft</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">52.57</subfield><subfield code="j">Energiespeicherung</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">52.56</subfield><subfield code="j">Regenerative Energieformen</subfield><subfield code="j">alternative Energieformen</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">84</subfield><subfield code="j">2016</subfield><subfield code="h">26-36</subfield><subfield code="g">11</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">530</subfield></datafield></record></collection>
|
author |
Liu, Wenhao |
spellingShingle |
Liu, Wenhao ddc 530 ddc 620 bkl 50.70 bkl 83.65 bkl 52.57 bkl 52.56 Elsevier Chaos Elsevier Image encryption Elsevier Close-loop modulation coupling model Elsevier Chaotic shift transform A fast image encryption algorithm based on chaotic map |
authorStr |
Liu, Wenhao |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)ELV004269535 |
format |
electronic Article |
dewey-ones |
530 - Physics 620 - Engineering & allied operations |
delete_txt_mv |
keep |
author_role |
aut |
collection |
elsevier |
remote_str |
true |
illustrated |
Not Illustrated |
topic_title |
530 530 DE-600 620 VZ 50.70 bkl 83.65 bkl 52.57 bkl 52.56 bkl A fast image encryption algorithm based on chaotic map Chaos Elsevier Image encryption Elsevier Close-loop modulation coupling model Elsevier Chaotic shift transform Elsevier |
topic |
ddc 530 ddc 620 bkl 50.70 bkl 83.65 bkl 52.57 bkl 52.56 Elsevier Chaos Elsevier Image encryption Elsevier Close-loop modulation coupling model Elsevier Chaotic shift transform |
topic_unstemmed |
ddc 530 ddc 620 bkl 50.70 bkl 83.65 bkl 52.57 bkl 52.56 Elsevier Chaos Elsevier Image encryption Elsevier Close-loop modulation coupling model Elsevier Chaotic shift transform |
topic_browse |
ddc 530 ddc 620 bkl 50.70 bkl 83.65 bkl 52.57 bkl 52.56 Elsevier Chaos Elsevier Image encryption Elsevier Close-loop modulation coupling model Elsevier Chaotic shift transform |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
zu |
author2_variant |
k s ks c z cz |
hierarchy_parent_title |
Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel |
hierarchy_parent_id |
ELV004269535 |
dewey-tens |
530 - Physics 620 - Engineering |
hierarchy_top_title |
Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)ELV004269535 |
title |
A fast image encryption algorithm based on chaotic map |
ctrlnum |
(DE-627)ELV024198064 (ELSEVIER)S0143-8166(16)30017-3 |
title_full |
A fast image encryption algorithm based on chaotic map |
author_sort |
Liu, Wenhao |
journal |
Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel |
journalStr |
Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel |
lang_code |
eng |
isOA_bool |
false |
dewey-hundreds |
500 - Science 600 - Technology |
recordtype |
marc |
publishDateSort |
2016 |
contenttype_str_mv |
zzz |
container_start_page |
26 |
author_browse |
Liu, Wenhao |
container_volume |
84 |
physical |
11 |
class |
530 530 DE-600 620 VZ 50.70 bkl 83.65 bkl 52.57 bkl 52.56 bkl |
format_se |
Elektronische Aufsätze |
author-letter |
Liu, Wenhao |
doi_str_mv |
10.1016/j.optlaseng.2016.03.019 |
dewey-full |
530 620 |
title_sort |
a fast image encryption algorithm based on chaotic map |
title_auth |
A fast image encryption algorithm based on chaotic map |
abstract |
Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. |
abstractGer |
Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. |
abstract_unstemmed |
Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks. |
collection_details |
GBV_USEFLAG_U GBV_ELV SYSFLAG_U |
title_short |
A fast image encryption algorithm based on chaotic map |
url |
https://doi.org/10.1016/j.optlaseng.2016.03.019 |
remote_bool |
true |
author2 |
Sun, Kehui Zhu, Congxu |
author2Str |
Sun, Kehui Zhu, Congxu |
ppnlink |
ELV004269535 |
mediatype_str_mv |
z |
isOA_txt |
false |
hochschulschrift_bool |
false |
author2_role |
oth oth |
doi_str |
10.1016/j.optlaseng.2016.03.019 |
up_date |
2024-07-06T20:48:02.056Z |
_version_ |
1803864120552849408 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">ELV024198064</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230625142425.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">180603s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/j.optlaseng.2016.03.019</subfield><subfield code="2">doi</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">GBVA2016003000018.pica</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)ELV024198064</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ELSEVIER)S0143-8166(16)30017-3</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">530</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">530</subfield><subfield code="q">DE-600</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">620</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">50.70</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">83.65</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">52.57</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">52.56</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Liu, Wenhao</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A fast image encryption algorithm based on chaotic map</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2016transfer abstract</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">11</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zzz</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">z</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">nicht spezifiziert</subfield><subfield code="b">zu</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Derived from Sine map and iterative chaotic map with infinite collapse (ICMIC), a new two-dimensional Sine ICMIC modulation map (2D-SIMM) is proposed based on a close-loop modulation coupling (CMC) model, and its chaotic performance is analyzed by means of phase diagram, Lyapunov exponent spectrum and complexity. It shows that this map has good ergodicity, hyperchaotic behavior, large maximum Lyapunov exponent and high complexity. Based on this map, a fast image encryption algorithm is proposed. In this algorithm, the confusion and diffusion processes are combined for one stage. Chaotic shift transform (CST) is proposed to efficiently change the image pixel positions, and the row and column substitutions are applied to scramble the pixel values simultaneously. The simulation and analysis results show that this algorithm has high security, low time complexity, and the abilities of resisting statistical analysis, differential, brute-force, known-plaintext and chosen-plaintext attacks.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Chaos</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Image encryption</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Close-loop modulation coupling model</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Chaotic shift transform</subfield><subfield code="2">Elsevier</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sun, Kehui</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhu, Congxu</subfield><subfield code="4">oth</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="n">Elsevier Science</subfield><subfield code="a">Pratap Singh, Ajeet ELSEVIER</subfield><subfield code="t">Performance enhancement strategies of a hybrid solar chimney power plant integrated with photovoltaic panel</subfield><subfield code="d">2020</subfield><subfield code="g">Amsterdam [u.a.]</subfield><subfield code="w">(DE-627)ELV004269535</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:84</subfield><subfield code="g">year:2016</subfield><subfield code="g">pages:26-36</subfield><subfield code="g">extent:11</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1016/j.optlaseng.2016.03.019</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_U</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ELV</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_U</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">50.70</subfield><subfield code="j">Energie: Allgemeines</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">83.65</subfield><subfield code="j">Versorgungswirtschaft</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">52.57</subfield><subfield code="j">Energiespeicherung</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="936" ind1="b" ind2="k"><subfield code="a">52.56</subfield><subfield code="j">Regenerative Energieformen</subfield><subfield code="j">alternative Energieformen</subfield><subfield code="q">VZ</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">84</subfield><subfield code="j">2016</subfield><subfield code="h">26-36</subfield><subfield code="g">11</subfield></datafield><datafield tag="953" ind1=" " ind2=" "><subfield code="2">045F</subfield><subfield code="a">530</subfield></datafield></record></collection>
|
score |
7.40088 |