Sign Up to like & get
recommendations!
1
Published in 2017 at "Neural Computing and Applications"
DOI: 10.1007/s00521-017-3199-x
Abstract: This work proposes an efficient and secure color and grayscale image encryption scheme that utilizes a chaining of skew tent maps as its pseudorandom number generator. The proposed scheme convolves the shuffling and mixing operations…
read more here.
Keywords:
scheme;
skew tent;
encryption scheme;
image encryption ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "Optical Review"
DOI: 10.1007/s10043-018-0464-x
Abstract: An asymmetric image encryption scheme is proposed using a phase-truncated discrete multiple-parameter fractional Fourier transform (DMPFRFT). After applying a pixel-scrambling operation and random-phase mask, an asymmetric ciphertext with stationary white noise can be obtained using…
read more here.
Keywords:
asymmetric image;
phase;
using phase;
image encryption ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "Analog Integrated Circuits and Signal Processing"
DOI: 10.1007/s10470-018-1252-z
Abstract: In this article a simple chaotic flow with hidden attractor is proposed. Various dynamics of this new system such as periodic and chaotic oscillations can be achieved by setting bifurcation parameters in a proper value.…
read more here.
Keywords:
image encryption;
system;
chaotic system;
encryption ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "Journal of Russian Laser Research"
DOI: 10.1007/s10946-017-9643-7
Abstract: We propose an improved optical image encryption scheme. By illuminating original images positioned in the input plane of the 4-f correlator and introducing reference waves with different incident angles in the output plane, we accomplish…
read more here.
Keywords:
image encryption;
mask;
random amplitude;
multiple image ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Mobile Networks and Applications"
DOI: 10.1007/s11036-019-01213-x
Abstract: Secure medical data transmission is the important criteria in tele-medicine. It is helpful for getting the exact medical information at the remote specialist’s side from the local doctor. The medical image watermarking technique is used…
read more here.
Keywords:
medical image;
image encryption;
image;
transmission ... See more keywords
Photo by kmuza from unsplash
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-5807-x
Abstract: Due to its inherent properties such as sensitivity to initial condition, ergodicity and systematic parametrization chaos systems have been extensively used in image encryption. However, one needs to optimize the chaos for each image being…
read more here.
Keywords:
based image;
image encryption;
image;
encryption ... See more keywords
Photo by usgs from unsplash
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6015-4
Abstract: In the recent literature, many research studies have proven that Known and Chosen plaintext attacks are very efficient tools that are widely used to cryptanalyze partially or completely some chaos-based and non-chaos cryptosystems. In this…
read more here.
Keywords:
image encryption;
image;
diffusion;
scheme using ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6996-z
Abstract: A new 2D Chebyshev-Sine map with natural evaluation is proposed and its dynamical behavior is analyzed. To investigate its application in information security, a color image encryption algorithm is designed. One-time initial condition expressed as…
read more here.
Keywords:
image encryption;
chebyshev sine;
new chebyshev;
sine map ... See more keywords
Photo by nci from unsplash
Sign Up to like & get
recommendations!
1
Published in 2019 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-07794-9
Abstract: This paper proposes a novel image encryption algorithm based on chaos and DNA planes operations by utilizing one time pad. The plain image is firstly shuffled by means of “interweaving of ranks”. Next, we divided…
read more here.
Keywords:
image encryption;
image;
dna;
chaos dna ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-08072-4
Abstract: Henon chaotic system is a kind of classical chaotic system which is widely studied and applied. However, when we analyze its chaotic characteristics, we can still find some shortcomings. In this paper, a Henon chaotic…
read more here.
Keywords:
chaotic system;
image encryption;
system;
henon chaotic ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2019 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-08234-4
Abstract: In this paper, a new scheme for image encryption based on a double chaotic pseudo random generator (DCPG), simple XOR and shift rotations operations is proposed. The DCPG is a combination of both Tent and…
read more here.
Keywords:
image encryption;
input image;
image;
double chaotic ... See more keywords