-
1
-
-
0042823356
-
Wavelet packets-based digital watermarking for image verification and authentication
-
Paquet A.H., Ward R.K., Pitas L. Wavelet packets-based digital watermarking for image verification and authentication. Signal Process 2003, 83:2117-2132.
-
(2003)
Signal Process
, vol.83
, pp. 2117-2132
-
-
Paquet, A.H.1
Ward, R.K.2
Pitas, L.3
-
2
-
-
73049097021
-
Secure reversible visible image watermarking with authentication
-
Tsai H.M., Chang L.W. Secure reversible visible image watermarking with authentication. Signal Process Image Commun 2010, 25:10-17.
-
(2010)
Signal Process Image Commun
, vol.25
, pp. 10-17
-
-
Tsai, H.M.1
Chang, L.W.2
-
3
-
-
75249099043
-
A secure and robust hash-based scheme for image authentication
-
Ahmed F., Siyal M.Y., Abbas V.U. A secure and robust hash-based scheme for image authentication. Signal Process 2010, 90:1456-1470.
-
(2010)
Signal Process
, vol.90
, pp. 1456-1470
-
-
Ahmed, F.1
Siyal, M.Y.2
Abbas, V.U.3
-
5
-
-
67651097643
-
A novel image hash algorithm resistant to print-scan
-
Wu D., Zhou X.B., Niu X.M. A novel image hash algorithm resistant to print-scan. Signal Process 2009, 89:2415-2424.
-
(2009)
Signal Process
, vol.89
, pp. 2415-2424
-
-
Wu, D.1
Zhou, X.B.2
Niu, X.M.3
-
7
-
-
77956113542
-
Analysis of the diffusion property of image encryption algorithm in block-and-permutation mode and its implementation
-
Zhou Q., Hu Y., Liao X.F. Analysis of the diffusion property of image encryption algorithm in block-and-permutation mode and its implementation. J Electron Info Technol 2010, 32:2015-2018.
-
(2010)
J Electron Info Technol
, vol.32
, pp. 2015-2018
-
-
Zhou, Q.1
Hu, Y.2
Liao, X.F.3
-
8
-
-
41349105116
-
Image encryption with fractional wavelet packet method
-
Chen L.F., Zhao D.M. Image encryption with fractional wavelet packet method. Optik 2008, 119:286-291.
-
(2008)
Optik
, vol.119
, pp. 286-291
-
-
Chen, L.F.1
Zhao, D.M.2
-
9
-
-
70049102750
-
Compression performance analysis of a sort of fast binary image encryption algorithms
-
Zhou Q., Hu Y., Liao X.F. Compression performance analysis of a sort of fast binary image encryption algorithms. J Electron Info Technol 2009, 31:2015-2018.
-
(2009)
J Electron Info Technol
, vol.31
, pp. 2015-2018
-
-
Zhou, Q.1
Hu, Y.2
Liao, X.F.3
-
10
-
-
0034249821
-
Partial encryption of compressed images and videos
-
Cheng H., Li X. Partial encryption of compressed images and videos. IEEE Trans Signal Process 2000, 48:2439-2451.
-
(2000)
IEEE Trans Signal Process
, vol.48
, pp. 2439-2451
-
-
Cheng, H.1
Li, X.2
-
11
-
-
33645805455
-
A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system
-
Bose R., Pathak S. A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Trans Circ Syst I 2006, 53:848-857.
-
(2006)
IEEE Trans Circ Syst I
, vol.53
, pp. 848-857
-
-
Bose, R.1
Pathak, S.2
-
12
-
-
24944578706
-
Selective bitplane encryption for secure transmission of image data in mobile environments
-
In: Fifth IEEE nordic signal processing symposium, Tromso-Trondheim, Norway;
-
Podesser M, Schmidt H, Uhl A, Selective bitplane encryption for secure transmission of image data in mobile environments. In: Fifth IEEE nordic signal processing symposium, Tromso-Trondheim, Norway; 2002.
-
(2002)
-
-
Podesser, M.1
Schmidt, H.2
Uhl, A.3
-
13
-
-
0032045063
-
Large encrypting binary images with higher security
-
Chung K.L., Chang L.C. Large encrypting binary images with higher security. Pattern Recognit Lett 1998, 19:461-468.
-
(1998)
Pattern Recognit Lett
, vol.19
, pp. 461-468
-
-
Chung, K.L.1
Chang, L.C.2
-
14
-
-
77952745685
-
An image encryption scheme with a pseudorandom permutation based on chaotic maps
-
Yoon J.W., Kim H. An image encryption scheme with a pseudorandom permutation based on chaotic maps. Commun Nonlinear Sci Numer Simul 2010, 15:3998-4006.
-
(2010)
Commun Nonlinear Sci Numer Simul
, vol.15
, pp. 3998-4006
-
-
Yoon, J.W.1
Kim, H.2
-
15
-
-
1342306864
-
A symmetric image encryption scheme based on 3D chaotic cat maps
-
Chen G., Mao Y., Chui C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fract 2004, 21:749-761.
-
(2004)
Chaos Solitons Fract
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.3
-
16
-
-
24944459842
-
Chaos-based image encryption algorithm
-
Guan Z., Huang F., Guan W. Chaos-based image encryption algorithm. Phys Lett A 2005, 346:153-157.
-
(2005)
Phys Lett A
, vol.346
, pp. 153-157
-
-
Guan, Z.1
Huang, F.2
Guan, W.3
-
17
-
-
57749200497
-
Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator
-
Tong X.J., Cui M.G. Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator. Signal Process 2009, 89:480-491.
-
(2009)
Signal Process
, vol.89
, pp. 480-491
-
-
Tong, X.J.1
Cui, M.G.2
-
18
-
-
37549014203
-
A new image encryption algorithm based on hyper-chaos
-
Gao T.G., Chen Z.Q. A new image encryption algorithm based on hyper-chaos. Phys Lett A 2008, 372:394-400.
-
(2008)
Phys Lett A
, vol.372
, pp. 394-400
-
-
Gao, T.G.1
Chen, Z.Q.2
-
19
-
-
45849121786
-
Parallel image encryption algorithm based on discretized chaotic map
-
Zhou Q., Wong K.W., Liao X.F., Xiang T., Hu Y. Parallel image encryption algorithm based on discretized chaotic map. Chaos Solitons Fract 2008, 38:1081-1092.
-
(2008)
Chaos Solitons Fract
, vol.38
, pp. 1081-1092
-
-
Zhou, Q.1
Wong, K.W.2
Liao, X.F.3
Xiang, T.4
Hu, Y.5
-
20
-
-
0036885204
-
Cryptanalysis of an encryption scheme for binary images
-
Chang C.C., Yu T.X. Cryptanalysis of an encryption scheme for binary images. Pattern Recognit Lett 2002, 23:1847-1852.
-
(2002)
Pattern Recognit Lett
, vol.23
, pp. 1847-1852
-
-
Chang, C.C.1
Yu, T.X.2
-
21
-
-
23144450151
-
On the security of 3D Cat map based symmetric image encryption scheme
-
Wang K., Pei, Zou L.H., Song A.G., He Z.Y. On the security of 3D Cat map based symmetric image encryption scheme. Phys Lett A 2005, 343:432-439.
-
(2005)
Phys Lett A
, vol.343
, pp. 432-439
-
-
Wang, K.1
Pei2
Zou, L.H.3
Song, A.G.4
He, Z.Y.5
-
22
-
-
61349130629
-
Cryptanalysis of a chaos-based image encryption algorithm
-
Cokal C., Solak E. Cryptanalysis of a chaos-based image encryption algorithm. Phys Lett A 2009, 373:1357-1360.
-
(2009)
Phys Lett A
, vol.373
, pp. 1357-1360
-
-
Cokal, C.1
Solak, E.2
-
23
-
-
65549134847
-
Analysis and improvement of a chaos-based image encryption algorithm
-
Xiao D., Liao X.F., Wei P.C. Analysis and improvement of a chaos-based image encryption algorithm. Chaos Solitons Fract 2009, 40:2191-2199.
-
(2009)
Chaos Solitons Fract
, vol.40
, pp. 2191-2199
-
-
Xiao, D.1
Liao, X.F.2
Wei, P.C.3
-
24
-
-
85196202553
-
Cryptanalysis of image encryption with compound chaotic sequence
-
In: 6th International multi-conference on systems, signals and devices, SSD'09, Djerba, Tunus
-
E. Solak, Cryptanalysis of image encryption with compound chaotic sequence. In: 6th International multi-conference on systems, signals and devices, SSD'09, Djerba, Tunus, 2009.
-
(2009)
-
-
Solak, E.1
-
25
-
-
70449495660
-
Cryptanalysis of a multi-chaotic systems based image cryptosystem
-
Solak E., Rhouma R., Belghith S. Cryptanalysis of a multi-chaotic systems based image cryptosystem. Opt Commun 2010, 283:232-236.
-
(2010)
Opt Commun
, vol.283
, pp. 232-236
-
-
Solak, E.1
Rhouma, R.2
Belghith, S.3
-
26
-
-
0346024202
-
On the security of a class of discrete-time chaotic cryptosystems
-
Solak E. On the security of a class of discrete-time chaotic cryptosystems. Phys Lett A 2004, 320:389-395.
-
(2004)
Phys Lett A
, vol.320
, pp. 389-395
-
-
Solak, E.1
-
27
-
-
85008921093
-
Chaos-based encryption for digital images and videos
-
Chapter 4, CRC Press, LLC, Available at:, B. Furht, D. Kirovski (Eds.)
-
Li S.J., Chen G.R., Zheng X. Chaos-based encryption for digital images and videos. Multimedia security handbook 2004, 133-167. Chapter 4, CRC Press, LLC, Available at:. http://www.hooklee.com/pub.html, B. Furht, D. Kirovski (Eds.).
-
(2004)
Multimedia security handbook
, pp. 133-167
-
-
Li, S.J.1
Chen, G.R.2
Zheng, X.3
-
28
-
-
85045783142
-
Fundamentals of multimedia encryption techniques
-
CRC Press, Boca Raton, FL, Chapter 3, B. Furht, D. Kirovski (Eds.)
-
Furht B., Socek D., Eskicioglu A.M. Fundamentals of multimedia encryption techniques. Multimedia security handbook 2004, 93-132. CRC Press, Boca Raton, FL, Chapter 3. B. Furht, D. Kirovski (Eds.).
-
(2004)
Multimedia security handbook
, pp. 93-132
-
-
Furht, B.1
Socek, D.2
Eskicioglu, A.M.3
-
30
-
-
33750542126
-
Some basic cryptographic requirements for chaos-based cryptosystems
-
Álvarez G., Li S.J. Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcat Chaos 2006, 16:2129-2151.
-
(2006)
Int J Bifurcat Chaos
, vol.16
, pp. 2129-2151
-
-
Álvarez, G.1
Li, S.J.2
-
31
-
-
42049108003
-
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
-
Li S.J., Li C.Q., Chen G.R., Bourbakis N.G., Lo K.-T. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process Image Commun 2008, 23:212-223.
-
(2008)
Signal Process Image Commun
, vol.23
, pp. 212-223
-
-
Li, S.J.1
Li, C.Q.2
Chen, G.R.3
Bourbakis, N.G.4
Lo, K.-T.5
-
32
-
-
75149134193
-
Image scrambling encryption algorithm of pixel bit based on chaos map
-
Ye G.D. Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit Lett 2010, 31:347-354.
-
(2010)
Pattern Recognit Lett
, vol.31
, pp. 347-354
-
-
Ye, G.D.1
-
33
-
-
78650867097
-
Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
-
Li C.Q., Lo K.T. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 2011, 91:949-954.
-
(2011)
Signal Process
, vol.91
, pp. 949-954
-
-
Li, C.Q.1
Lo, K.T.2
-
35
-
-
67349274130
-
Cryptanalysis of a spatiotemporal chaotic cryptosystem
-
Rhouma R., Safya B. Cryptanalysis of a spatiotemporal chaotic cryptosystem. Chaos Solitons Fract 2009, 41:1718-1722.
-
(2009)
Chaos Solitons Fract
, vol.41
, pp. 1718-1722
-
-
Rhouma, R.1
Safya, B.2
-
36
-
-
34548361693
-
Cryptanalysis of two chaotic encryption schemes based on circular bit shift and xor operations
-
Li C.Q., Li S.J., Álvarez G., Chen G.R., Lo K.-T. Cryptanalysis of two chaotic encryption schemes based on circular bit shift and xor operations. Phys Lett A 2007, 369:23-30.
-
(2007)
Phys Lett A
, vol.369
, pp. 23-30
-
-
Li, C.Q.1
Li, S.J.2
Álvarez, G.3
Chen, G.R.4
Lo, K.-T.5
-
37
-
-
85196177395
-
-
FileFormat.Info. Available from:
-
FileFormat.Info. Available from: 2009. http://www.fileformat.info/tip/web/imagesize.htm.
-
(2009)
-
-
-
38
-
-
85196211123
-
-
The USC-SIPI image database. Available from:
-
The USC-SIPI image database. Available from: http://sipi.usc.edu/database/.
-
-
-
-
39
-
-
33644933805
-
A self-adaptive algorithm on image encryption
-
Chen G., Zhao X.Y., Li J.L. A self-adaptive algorithm on image encryption. J Softw 2005, 16(11):1974-1975.
-
(2005)
J Softw
, vol.16
, Issue.11
, pp. 1974-1975
-
-
Chen, G.1
Zhao, X.Y.2
Li, J.L.3
-
40
-
-
34547285788
-
Selective image encryption using a spatiotemporal chaotic system
-
Xiang T., Wong K.W., Liao X.F. Selective image encryption using a spatiotemporal chaotic system. Chaos 2007, 17:023115.
-
(2007)
Chaos
, vol.17
, pp. 023115
-
-
Xiang, T.1
Wong, K.W.2
Liao, X.F.3
-
41
-
-
85196151120
-
-
FIPS-197, Announcing the advanced encryption standard.
-
FIPS-197, Announcing the advanced encryption standard.
-
-
-
-
42
-
-
85036655885
-
Cryptanalysis on an image scrambling encryption scheme based on pixel bit
-
Springer, Heidelberg, H.J. Kim, Y.Q. Shi, M. Barni (Eds.) IWDW 2010
-
Zhao L., Adhikari A., Xiao D., Sakurai K. Cryptanalysis on an image scrambling encryption scheme based on pixel bit. LNCS 2011, vol. 6526:45-59. Springer, Heidelberg. H.J. Kim, Y.Q. Shi, M. Barni (Eds.).
-
(2011)
LNCS
, vol.6526
, pp. 45-59
-
-
Zhao, L.1
Adhikari, A.2
Xiao, D.3
Sakurai, K.4
-
43
-
-
85196156943
-
Security improvement of a pixel bit based image scrambling encryption scheme through the self-correlation method
-
In: Lai XJ, Yung M, Lin DD, editors. INSCRYPT 2010 (short paper), Science Press of China;
-
Zhao L, Adhikari A, Xiao D, Sakurai K. Security improvement of a pixel bit based image scrambling encryption scheme through the self-correlation method. In: Lai XJ, Yung M, Lin DD, editors. INSCRYPT 2010 (short paper), Science Press of China; 2010. p. 88-102.
-
(2010)
, pp. 88-102
-
-
Zhao, L.1
Adhikari, A.2
Xiao, D.3
Sakurai, K.4
|