Authors:
(1) Sheng Liu, School of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, Hunan, China;
(2) Chengqing Li (Corresponding author), School of Computer Science, Xiangtan University, Xiangtan 411105, Hunan, China;
(3) Qiao Hu, School of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, Hunan, China.
Table of Links
2. Description of two analyzed image encryption algorithms
5. Conclusion, Acknowledgements, and References
2. Description of two analyzed image encryption algorithms
2.1. The framework of IEATD
2.2. The enhanced elements of IEACD compared with IEATD
To enhance the security level of IEATD, some extra operations were appended to withstand the chosen-plaintext attack reported in [13].
• The added secret sub-keys: a positive integer C, the initial condition q(0) ∈ (0, 1) and the control parameter β ∈ (3.5699456, 4] of Logistic map
• The modified encryption procedures:
This paper is available on arxiv under CC by 4.0 Deed (Attribution 4.0 International) license.