Arnold's cat map

Known as: Cat mapping, Cat map, Arnold Cat map 
In mathematics, Arnold's cat map is a chaotic map from the torus into itself, named after Vladimir Arnold, who demonstrated its effects in the 1960s… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Pseudorandom number generators (PRNGs) generate random bit streams based on deterministic algorithms. Any bit stream generated… (More)
  • figure 1
  • figure 2
  • table 2
  • figure 3
  • figure 4
Is this relevant?
2016
2016
Cryptography is a field that has developed very rapidly with the number of algorithms that keep popping up with this type of… (More)
  • figure 2
  • figure 1
  • figure 5
  • table 3
  • figure 3
Is this relevant?
2015
2015
A lossless symmetric key encryption scheme is presented, which makes use of the Discrete Haar Wavelet Transform and the Arnold… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table 2
Is this relevant?
2015
2015
Analyzing the randomness, complexity and efficiency of chaotic image encryption using 1D Logistic map, 2D Arnold cat map or 3D… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2013
2013
In this paper we have done the Encryption and Decryption of an image by doing pixel shuffling using Arnold Cat Map and generate… (More)
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
2013
2013
With the fast evolution of digital data exchange and increased usage of multi media images, it is essential to protect the… (More)
  • figure 6.15
Is this relevant?
2013
2013
The Arnold cat map is employed in various applications where chaos is utilized, especially chaos-based cryptography and… (More)
  • figure 1
  • table I
  • table II
  • table III
  • table V
Is this relevant?
2013
2013
In Medical Industry, the patient's information plays a very vital role for telediagnosis and telesurgery. Medical image content… (More)
  • figure 1
  • figure 3
  • figure 4
  • table I
  • table 11
Is this relevant?
2011
2011
Abstract: Nowadays, using Internet application and number of computer networks users are too numerous. And so many different… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Encryption of images is different from that of texts due to some intrinsic features of images such as bulk data capacity and high… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?