zbMATH — the first resource for mathematics

Geometry Search for the term Geometry in any field. Queries are case-independent.
Funct* Wildcard queries are specified by * (e.g. functions, functorial, etc.). Otherwise the search is exact.
"Topological group" Phrases (multi-words) should be set in "straight quotation marks".
au: Bourbaki & ti: Algebra Search for author and title. The and-operator & is default and can be omitted.
Chebyshev | Tschebyscheff The or-operator | allows to search for Chebyshev or Tschebyscheff.
"Quasi* map*" py: 1989 The resulting documents have publication year 1989.
so: Eur* J* Mat* Soc* cc: 14 Search for publications in a particular source with a Mathematics Subject Classification code (cc) in 14.
"Partial diff* eq*" ! elliptic The not-operator ! eliminates all results containing the word elliptic.
dt: b & au: Hilbert The document type is set to books; alternatively: j for journal articles, a for book articles.
py: 2000-2015 cc: (94A | 11T) Number ranges are accepted. Terms can be grouped within (parentheses).
la: chinese Find documents in a given language. ISO 639-1 language codes can also be used.

a & b logic and
a | b logic or
!ab logic not
abc* right wildcard
"ab c" phrase
(ab c) parentheses
any anywhere an internal document identifier
au author, editor ai internal author identifier
ti title la language
so source ab review, abstract
py publication year rv reviewer
cc MSC code ut uncontrolled term
dt document type (j: journal article; b: book; a: book article)
A new compound mode of confusion and diffusion for block encryption of image based on chaos. (English) Zbl 1222.94013
Summary: A block encryption for image using combination of confusion and diffusion is proposed in this paper. In this encryption, a new compound mode is proposed. Baker map is used to generate a pseudo-random sequence, and several one-dimension chaotic maps are dynamically selected to encrypt blocks of image, in the order of the pseudo-random sequence generated by Baker map. Different with other combined encryptions, the algorithm of this encryption does not confusion original image directly, but generate a pseudo-random, which is used as a route for diffusion, combines pixels to block randomly and arrays them. When diffusion is executing, for mutual diffusion of pixels, the confusion is working by the pseudo-random order of route, the combination is deep-seated.
94A08Image processing (compression, reconstruction, etc.)
65C10Random number generation (numerical analysis)
37D45Strange attractors, chaotic dynamics
37N35Dynamical systems in control
[1]Yen JC, Guo JI. A new chaotic key-based design for image encryption and decryption. In: ISCAS, IEEE international symposium on circuits and systems, May, Geneva, Switzerland; 2000, vol. 4(2). p. 49 – 52.
[2]Li SJ, Zheng X. Cryptanalysis of a chaotic image encryption method. In: IEEE international symposium on circuits and systems. Scottsdale, AZ, USA; 2002.
[3]Scharinger, J.: Fast encryption of image data using chaotic Kolmogorov flows, J electron imaging 7, No. 2, 318-325 (1998)
[4]Yen JC, Guo JI. Efficient hierarchical chaotic image encryption algorithm and its VLSI realization. In: IEE Proceedings-vision, image and signal processing; 2000, vol. 147(2). p. 167 – 175.
[5]Yano, K.; Tanaka, K.: Image encryption scheme based on a truncated Baker transformation, IEICE trans fund 85-A, No. 9, 2025-2035 (2002)
[6]Zhang, X. H.; Liu, F.; Jiao, L. C.: An encryption arithmetic based on chaotic sequence, Chin J image graphics 8A, No. 4, 374-378 (2003)
[7]Neto, L. G.; Sheng, Y. L.: Optical implementation of image encryption using random phase encoding, Opt eng 35, No. 9, 2459-2463 (1996)
[8]Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps, Int J birfurcation chaos 8, No. 6, 1259-1284 (1998) · Zbl 0935.94019 · doi:10.1142/S021812749800098X
[9]Chuang, T. J.; Lin, J. C.: A new multi-resolution approach to still image encryption, Pattern recognit 9, No. 3, 431-436 (1999)
[10]Li, C. G.; Han, Z. Z.; Zhang, H. R.: An image encryption algorithm based on random key and quasi-standard map, Chin J comput 26, No. 4, 465-470 (2003)
[11]Chen, G.; Mao, Y. B.; Chui, C. K.: A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos solitons fract 21, No. 3, 749-761 (2004) · Zbl 1049.94009 · doi:10.1016/j.chaos.2003.12.022