Access the full text.
Sign up today, get DeepDyve free for 14 days.
R. Krishnamoorthi, P. Sheba, Kezia Malarchelvi (2008)
Selective Combinational Encryption of Gray Scale Images using Orthogonal Polynomials based Transformation
Lala Krikor, Sami Baba, Thawar Arif (2009)
Zyad Shaaban image encryption using DCT and stream cipherEuropean Journal of Scientific Research, 32
C. Shannon (1948)
A mathematical theory of communicationBell Syst. Tech. J., 27
Huijuan Li, Yurong Wang, H. Yan, Liben Li, Qiuze Li, Xiaoyan Zhao (2013)
Double-image encryption by using chaos-based local pixel scrambling technique and gyrator transformOptics and Lasers in Engineering, 51
M. Baptista (1998)
Cryptography with chaosPhysics Letters A, 240
Yi Qin, Hualong Jiang, Q. Gong (2014)
Interference-based multiple-image encryption by phase-only mask multiplexing with high quality retrieved imagesOptics and Lasers in Engineering, 62
Ju-Young Oh, Dong-Il Yang, K. Chon (2010)
A Selective Encryption Algorithm Based on AES for Medical InformationHealthcare Informatics Research, 16
Shi Liu, J. Sheridan (2013)
Optical encryption by combining image scrambling techniques in fractional Fourier domainsOptics Communications, 287
Zhu Yu, Zhou Zhe, Haibing Yang, Wenjie Pan, Yunpeng Zhang (2010)
A chaos-based image encryption algorithm using wavelet transform2010 2nd International Conference on Advanced Computer Control, 2
Nanrun Zhou, Xingbin Liu, Ye Zhang, Yixian Yang (2013)
Image encryption scheme based on fractional Mellin transform and phase retrieval technique in fractional Fourier domainOptics and Laser Technology, 47
Reza Rad, Abdolrahman Attar, Reza Atani (2013)
A Comprehensive Layer Based Encryption Method for Visual Data
Zhengjun Liu, She Li, Wei Liu, Yanhua Wang, Shutian Liu (2013)
Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encodingOptics and Lasers in Engineering, 51
Shen Jian-bing (2002)
MAGIC CUBE TRANSFORMATION AND ITS APPLICATION IN DIGITAL IMAGE ENCRYPTIONComputer Engineering
Shaojiang Deng, Linhua Zhang, D. Xiao (2005)
Image Encryption Scheme Based on Chaotic Neural System
C. Kuo (1993)
Novel image encryption technique and its application in progressive transmissionJ. Electronic Imaging, 2
Manish Kumar, D. Mishra, R. Sharma (2014)
A first approach on an RGB image encryptionOptics and Lasers in Engineering, 52
V. Suresh, C. Madhavan (2012)
Image Encryption with Space-filling CurvesDefence Science Journal, 62
Ziba Eslami, Atieh Bakhshandeh (2013)
An improvement over an image encryption method based on total shufflingOptics Communications, 286
Xiaoqiang Zhang, Guiliang Zhu, Shilong Ma (2012)
Remote-sensing image encryption in hybrid domainsOptics Communications, 285
D. ParameshachariB., K. Soyjaudah, A. SumitraDeviK (2013)
Secure Transmission of an Image using Partial Encryption based AlgorithmInternational Journal of Computer Applications, 63
M. Rodriguez-Sahagun, J. Mercado-Sanchez, D. López-Mancilla, R. Jaimes-Reátegui, J. García-López (2010)
Image Encryption Based on Logistic Chaotic Map for Secure Communications2010 IEEE Electronics, Robotics and Automotive Mechanics Conference
Hoongee Yang, Eun-Soo Kim (1996)
Practical image encryption scheme by real‐valued dataOptical Engineering, 35
S Sasidharan, DS Philip (2011)
A fast partial encryption scheme with wavelet transform and RC4International Journal of Advances in Engineering & Technology (IJAET), 1
Dezhao Kong, Xueju Shen (2014)
Multiple-image encryption based on optical wavelet transform and multichannel fractional Fourier transformOptics and Laser Technology, 57
M. Sobhy, A. Shehata (2001)
Chaotic algorithms for data encryption2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221), 2
C. Shannon (1950)
The mathematical theory of communication
Nidhi Taneja, B. Raman, I. Gupta (2011)
Combinational domain encryption for still visual dataMultimedia Tools and Applications, 59
R. Metzler, S. Agaian (2010)
Selective region encryption using a fast shape adaptive transform2010 IEEE International Conference on Systems, Man and Cybernetics
Chang-Mok Shin, D. Seo, Kyu-Bo Cho, Ha-Woon Lee, Soo-Joong Kim (2003)
Multilevel image encryption by binary phase XOR operationsCLEO/Pacific Rim 2003. The 5th Pacific Rim Conference on Lasers and Electro-Optics (IEEE Cat. No.03TH8671), 2
Charles Schwartz (1991)
A New Graphical Method for Encryption of Computer DataCryptologia, 15
A. Sinha, Kehar Singh (2003)
A technique for image encryption using digital signatureOptics Communications, 218
Rhouma Rhouma, David Arroyo, S. Belghith (2009)
A new color image cryptosystem based on a piecewise linear chaotic map2009 6th International Multi-Conference on Systems, Signals and Devices
RS Yadav, MHDR Beg, MM Tripathi (2013)
Image encryption techniques: A critical comparisonInternational Journal of Computer Science Engineering and Information Technology Research, 3
M. Salleh, S. Ibrahim, I. Isnin (2003)
Enhanced chaotic image encryption algorithm based on Baker's mapProceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03., 2
Q. Ran, Tieyu Zhao, Lin Yuan, Jian Wang, Lei Xu (2014)
Vector power multiple-parameter fractional Fourier transform of image encryption algorithmOptics and Lasers in Engineering, 62
A. Yekkala, N. Udupa, N. Bussa, C. Madhavan (2007)
Lightweight Encryption for Images2007 Digest of Technical Papers International Conference on Consumer Electronics
C. Alexopoulos, N. Bourbakis, N. Ioannou (1995)
Image encryption method using a class of fractalsJ. Electronic Imaging, 4
F. Belkhouche, U. Qidwai (2003)
Binary image encoding using 1D chaotic mapsAnnual Technical Conference IEEE Region 5, 2003
Marc Droogenbroeck, R. Benedett (2002)
Techniques for a selective encryption of uncompressed and compressed images
HT Panduranga, SK Naveenkumar (2013)
Selective image encryption for medical and satellite imagesInternational Journal of Engineering and Technology (IJET), 5
N. Bourbakis, C. Alexopoulos (1992)
Picture data encryption using scan patternsPattern Recognit., 25
Musheer Ahmad, M. Alam (2009)
A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping
Zhengjun Liu, Yu Zhang, She Li, Wei Liu, Wanyu Liu, Yanhua Wang, Shutian Liu (2013)
Double image encryption scheme by using random phase encoding and pixel exchanging in the gyrator transform domainsOptics and Laser Technology, 47
J. Fridrich (1997)
Image encryption based on chaotic maps1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, 2
L. Sui, Bo Gao (2013)
Single-channel color image encryption based on iterative fractional Fourier transform and chaosOptics and Laser Technology, 48
C. Shannon (1949)
Communication theory of secrecy systemsBell Syst. Tech. J., 28
Toshiki Habutsu, Y. Nishio, I. Sasase, S. Mori (1990)
A Secret Key Cryptosystem Using a Chaotic MapIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 73
Nanrun Zhou, Yixian Wang, L. Gong, Xiubo Chen, Yixian Yang (2012)
Novel color image encryption algorithm based on the reality preserving fractional Mellin transformOptics and Laser Technology, 44
A. Wong, W. Bishop (2018)
Backwards Compatible, Multi-Level Regions-of-Interest (ROI) Image Encryption Architecture with Biometric Authentication
Hang Chen, Xiaoping Du, Zhengjun Liu, Cheng-Yun Yang (2013)
Color image encryption based on the affine transform and gyrator transformOptics and Lasers in Engineering, 51
Z. Brahimi, H. Bessalah, A. Tarabet, M. Kholladi (2008)
A new selective encryption technique of JPEG2000 codestream for medical images transmission2008 5th International Multi-Conference on Systems, Signals and Devices
Zhao Xue (2003)
Digital image scrambling based on the baker's transformationJournal of Northwest Normal University
Yan Shen, Guoji Zhang, Xuan Li, Qing Liu (2011)
An Improved Image Encryption Method Based on Total Shuffling SchemeOptics Communications, 284
Hameed Younis, T. Abdalla, A. Abdalla (2009)
Vector Quantization Techniques For Partial Encryption of Wavelet-based Compressed Digital ImagesJournal of Electrical and Electronic Engineering, 5
J. Rodrigues, W. Puech, A. Bors (2006)
A Selective Encryption for Heterogenous Color JPEG Images Based on VLC and AES Stream Cipher
Yushu Zhang, D. Xiao (2014)
An image encryption scheme based on rotation matrix bit-level permutation and block diffusionCommun. Nonlinear Sci. Numer. Simul., 19
Wei Ding, W. Yan, Dongxu Qi (2000)
A novel digital image hiding technology based on tangram and Conways' gameProceedings 2000 International Conference on Image Processing (Cat. No.00CH37101), 1
Li-Chun Chang (2002)
IMAGE ENCRYPTION TECHNIQUES: A SURVEYJournal of Computer Research and Development
J. Scharinger, F. Pichler (1996)
Efficient image encryption based on chaotic maps
Guosheng Gu, Guoqiang Han (2006)
An Enhanced Chaos Based Image Encryption AlgorithmFirst International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06), 1
Nahla Flayh, R. Parveen, S. Ahson (2009)
Wavelet based partial image encryption2009 International Multimedia, Signal Processing and Communication Technologies
Shubhangini Nichat (2013)
Image Encryption using Hybrid Genetic Algorithm
A. Sinha, Kehar Singh (2005)
Image encryption by using fractional fourier transform and jigsaw transform in image bit planesOptical Engineering, 44
K. Martin, R. Lukac, K. Plataniotis (2005)
Efficient encryption of wavelet-based coded color imagesPattern Recognit., 38
Manisha Sharma, M. Pandit, L. Srivastava (2010)
Multi-area economic dispatch with tie-line constraints employing evolutionary approachInternational journal of engineering science and technology, 2
K. Kuppusamy, K. Thamodaran (2012)
Optimized partial image encryption scheme using PSOInternational Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)
Wang Ying, DeLing Zheng, Ju Lei, Yaoguang Wei (2004)
The spatial-domain encryption of digital images based on high-dimension chaotic systemIEEE Conference on Cybernetics and Intelligent Systems, 2004., 2
Nanrun Zhou, Aidi Zhang, Fen Zheng, L. Gong (2014)
Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensingOptics and Laser Technology, 62
Yuhang He, Yiping Cao, Xi Lu (2012)
Color image encryption based on orthogonal composite grating and double random phase encoding techniqueOptik, 123
Z. Aihong, L. Lian, Z. Shuai (2010)
Research on method of color image protective transmission based on Logistic map2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 9
AB Abugharsa, H Almangush (2011)
A new image encryption approach using block-based on shifted algorithmInternational Journal of Computer Science and Network Security (IJCSNS), 11
L. Sui, M. Xin, A. Tian, Haiyan Jin (2013)
Single-channel color image encryption using phase retrieve algorithm in fractional Fourier domainOptics and Lasers in Engineering, 51
Jun-Xin Chen, Zhiliang Zhu, Chong Fu, Li-bo Zhang, Hai Yu (2015)
Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domainsOptics and Lasers in Engineering, 66
H. Nien, Wei-Tzer Huang, C. Hung, S. Chen, S. Wu, Chuan-Kuei Huang, Y. Hsu (2009)
Hybrid image encryption using multi-chaos-system2009 7th International Conference on Information, Communications and Signal Processing (ICICS)
M. Podesser, H.-P. Schmidt, A. Uhl (2002)
SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS
Xiangling Ding, Guangyi Chen (2014)
Optical color image encryption using position multiplexing technique based on phase truncation operationOptics and Laser Technology, 57
Muhammad Abuturab (2012)
Securing color information using Arnold transform in gyrator transform domainOptics and Lasers in Engineering, 50
Wang Wei, Fen-lin Liu, Ge Xinl, You Yebin (2010)
Color image encryption algorithm based on hyper chaos2010 2nd IEEE International Conference on Information Management and Engineering
Min Zhang, G.-C. Shao, K. Yi (2004)
T-matrix and its applications in image processingElectronics Letters, 40
V. Divya, S. Sudha, V. Resmy (2012)
Simple and Secure Image Encryption
P Kumar (2012)
RC4 enrichment algorithm approach for selective image encryptionInternational Journal of Computer Science & Communication Networks, 2
S. Kamali, Reza Shakerian, Maysam Hedayati, Mohsen Rahmani (2010)
A new modified version of Advanced Encryption Standard based algorithm for image encryption2010 International Conference on Electronics and Information Engineering, 1
Huang Xiao, Guo-ji Zhang (2006)
An Image Encryption Scheme Based on Chaotic Systems2006 International Conference on Machine Learning and Cybernetics
Y. Rao, A. Mitra, S. Prasanna (2006)
A Partial Image Encryption Method with Pseudo Random Sequences
M Sharma, MK Kowar (2010)
Image encryption techniques using chaotic schemes: a reviewInternational Journal of Engineering Science and Technology, 2
J. Yen, Jim-In Guo (2000)
A new chaotic key-based design for image encryption and decryption2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353), 4
N. Masuda, K. Aihara (2002)
Cryptosystems with discretized chaotic mapsIEEE Transactions on Circuits and Systems I-regular Papers, 49
Yushu Zhang, D. Xiao, Wenying Wen, Yue Tian (2013)
Edge-based lightweight image encryption using chaos-based reversible hidden transform and multiple-order discrete fractional cosine transformOptics and Laser Technology, 54
Yang Ou, Chul Sur, K. Rhee (2007)
Region-Based Selective Encryption for Medical Imaging
R. Matthews (1989)
On the Derivation of a "Chaotic" Encryption AlgorithmCryptologia, 13
H. Kekre, T. Sarode, P. Halarnkar, D. Mazumder (2014)
Comparative Performance of Image Scrambling in Transform Domain using Sinusoidal TransformsThe International Journal on the Image, 8
A. El-latif, X. Niu, M. Amin (2012)
A new image cipher in time and frequency domainsOptics Communications, 285
J. Mastan, G. Kumar, K. Bagan (2011)
A Color Image Encryption Technique Based on a Substitution-Permutation Network
L. Jawad, Ghazali Sulong (2013)
A review of color image encryption techniques
A Menezes, P Oorschot, S Vanstone (1996)
Applied cryptography
3D Res (2014) 5:29 DOI 10.1007/s13319-014-0029-0 3DR REVIEW Majid Khan Tariq Shah Received: 29 June 2014 / Revised: 24 September 2014 / Accepted: 2 October 2014 / Published online: 22 October 2014 © 3D Research Center, Kwangwoon University and Springer-Verlag Berlin Heidelberg 2014 Abstract Image encryption plays a paramount part procurements get essential in practice and along these to guarantee classified transmission and capacity of lines security of sight and sound data has gotten image over web. Then again, a real-time image standard concern. The central issues identifying with encryption confronts a more noteworthy test because the issue of encryption has been inspected and of vast measure of information included. This paper moreover an outline on picture encryption strategies exhibits an audit on image encryption in spatial, centered on chaotic techniques have been overseen in frequency and hybrid domains with both full encryp- the present correspondence. tion and selective encryption strategy. The chaotic image encryption could be made by using properties of chaos including deterministic Keywords Image encryption · Domains of image elements, erratic conduct and non-straight change. encryption · Full and selective image This thought prompts routines that can in the encryption techniques meantime give security limits and
3D Research – Springer Journals
Published: Oct 22, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.