Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,238,537 papers from all fields of science
Search
Sign In
Create Free Account
Confusion and diffusion
Known as:
Diffusion (cryptography)
, Confusion (cryptography)
, Diffusion and confusion
Expand
In cryptography, confusion and diffusion are two properties of the operation of a secure cipher identified by Claude Shannon in his 1945 classified…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
Algorithmic information theory
Avalanche effect
Bent function
Cipher
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
A chaos-based image encryption algorithm with simple logical functions
Erdem Yavuz
,
R. Yazici
,
M. C. Kasapbaşi
,
Ezgi Yamac
Computers & electrical engineering
2016
Corpus ID: 44866758
Highly Cited
2015
Highly Cited
2015
Image encryption: Generating visually meaningful encrypted images
Long Bao
,
Yicong Zhou
Information Sciences
2015
Corpus ID: 30676166
Highly Cited
2015
Highly Cited
2015
A secure image encryption scheme based on chaotic maps and affine transformation
Jawad Ahmad
,
S. Hwang
Multimedia tools and applications
2015
Corpus ID: 36284256
Due to the interesting nonlinear dynamic properties of chaotic maps, recently chaos-based encryption algorithms have gained much…
Expand
Highly Cited
2012
Highly Cited
2012
Image encryption using DNA complementary rule and chaotic maps
Hongjun Liu
,
Xing-yuan Wang
,
A. Kadir
Applied Soft Computing
2012
Corpus ID: 6899935
Highly Cited
2011
Highly Cited
2011
A chaos-based symmetric image encryption scheme using a bit-level permutation
Zhiliang Zhu
,
Wei Zhang
,
Kwok-wo Wong
,
Hai Yu
Information Sciences
2011
Corpus ID: 121495060
Highly Cited
2010
Highly Cited
2010
Color image encryption based on one-time keys and robust chaotic maps
Hongjun Liu
,
Xing-yuan Wang
Computers and Mathematics with Applications
2010
Corpus ID: 11378049
Highly Cited
2010
Highly Cited
2010
Analysis and improvement of a chaos-based Hash function construction
Shaojiang Deng
,
Yantao Li
,
D. Xiao
2010
Corpus ID: 62559755
Highly Cited
2010
Highly Cited
2010
Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata
Rong-Jian Chen
,
S. Horng
Signal processing. Image communication
2010
Corpus ID: 29424258
Highly Cited
2006
Highly Cited
2006
A Fast Image Encryption Scheme based on Chaotic Standard Map
Kwok-wo Wong
,
B. S. Kwok
,
Wing-Shing Law
arXiv.org
2006
Corpus ID: 5510569
Highly Cited
2005
Highly Cited
2005
Security Analysis of A Chaos-based Image Encryption Algorithm
Shiguo Lian
,
Jinsheng Sun
,
Zhiquan Wang
arXiv.org
2005
Corpus ID: 3263010
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE