-
1
-
-
33750542126
-
Some basic cryptographic requirements for chaos-based cryptosystems
-
Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16(8):2129–2151
-
(2006)
Int J Bifurcation Chaos
, vol.16
, Issue.8
, pp. 2129-2151
-
-
Alvarez, G.1
Li, S.2
-
2
-
-
33947645376
-
Onali T
-
of International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
-
Ginesu G, Giusto DD, Onali T (2006) Wavelet domain scrambling for image-based authentication. In: Proc. of International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 313–316
-
(2006)
Wavelet domain scrambling for image-based authentication. In: Proc
, pp. 313-316
-
-
Ginesu, G.1
Giusto, D.D.2
-
3
-
-
84878400141
-
Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps
-
Hermassi H, Belazi A, Rhouma R, Belghith SM (2013) Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimed Tools Appl. doi:10.1007/s11042-013-1533-6
-
(2013)
Multimed Tools Appl
-
-
Hermassi, H.1
Belazi, A.2
Rhouma, R.3
Belghith, S.M.4
-
4
-
-
33750344108
-
Perceptual image hashing via feature points: performance evaluation and tradeoffs
-
Monga V, Evans BL (2006) Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Proc 15(11):3452–3465
-
(2006)
IEEE Trans Image Proc
, vol.15
, Issue.11
, pp. 3452-3465
-
-
Monga, V.1
Evans, B.L.2
-
6
-
-
80051543901
-
Robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption
-
Patidar V, Pareek NK, Purohit G, Sud KK (2011) Robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt Commun 284(19):4331–4339
-
(2011)
Opt Commun
, vol.284
, Issue.19
, pp. 4331-4339
-
-
Patidar, V.1
Pareek, N.K.2
Purohit, G.3
Sud, K.K.4
-
7
-
-
0011954758
-
Matrix transformation and its application to image hiding
-
(in Chinese)
-
Qi D (1999) Matrix transformation and its application to image hiding. J North China Univ Technol 11(1):24–28 (in Chinese)
-
(1999)
J North China Univ Technol
, vol.11
, Issue.1
, pp. 24-28
-
-
Qi, D.1
-
8
-
-
84866869431
-
Reversible data hiding scheme based on image inpainting
-
Qin C, Wang Z, Chang CC (2012) Reversible data hiding scheme based on image inpainting. Fundam Informaticae 120(1):59–70
-
(2012)
Fundam Informaticae
, vol.120
, Issue.1
, pp. 59-70
-
-
Qin, C.1
Wang, Z.2
Chang, C.C.3
-
9
-
-
58349093097
-
A block location scrambling algorithm of digital image based on Arnold transformation. In: Proc. of the 9th International Conference for Young Computer Scientists, pp
-
Shang Z, Ren H, Zhang J (2008) A block location scrambling algorithm of digital image based on Arnold transformation. In: Proc. of the 9th International Conference for Young Computer Scientists, pp. 2942–2947
-
(2008)
2942–2947
-
-
Shang, Z.1
Ren, H.2
Zhang, J.3
-
10
-
-
84940644968
-
A mathematical theory of communication
-
623–656
-
Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379–423, 623–656
-
(1948)
Bell Syst Tech J
, vol.27
, Issue.3
, pp. 379-423
-
-
Shannon, C.E.1
-
11
-
-
77949270836
-
A new cryptosystem based on spatial chaotic system
-
Sun F, Lü Z, Liu S (2010) A new cryptosystem based on spatial chaotic system. Opt Commun 283(10):2066–2073
-
(2010)
Opt Commun
, vol.283
, Issue.10
, pp. 2066-2073
-
-
Sun, F.1
Lü, Z.2
Liu, S.3
-
12
-
-
84871857309
-
Robust image hashing based on multiple histograms
-
Tang Z, Huang L, Dai Y, Yang F (2012) Robust image hashing based on multiple histograms. Int J Digit Content Technol Appl 6(23):39–47
-
(2012)
Int J Digit Content Technol Appl
, vol.6
, Issue.23
, pp. 39-47
-
-
Tang, Z.1
Huang, L.2
Dai, Y.3
Yang, F.4
-
13
-
-
83455246883
-
Image encryption using mapping array and random division
-
Tang Z, Lan W, Dai Y, He J (2011) Image encryption using mapping array and random division. ICIC Express Lett Part B Appl 2(6):1297–1302
-
(2011)
ICIC Express Lett Part B Appl
, vol.2
, Issue.6
, pp. 1297-1302
-
-
Tang, Z.1
Lan, W.2
Dai, Y.3
He, J.4
-
14
-
-
70350221685
-
Robust image hashing for tamper detection using nonnegative matrix factorization
-
Tang Z, Wang S, Zhang X, Wei W, Su S (2008) Robust image hashing for tamper detection using nonnegative matrix factorization. J Ubiquit Converg Technol 2(1):18–26
-
(2008)
J Ubiquit Converg Technol
, vol.2
, Issue.1
, pp. 18-26
-
-
Tang, Z.1
Wang, S.2
Zhang, X.3
Wei, W.4
Su, S.5
-
15
-
-
79955412469
-
Secure image encryption without size limitation using Arnold transform and random strategies
-
Tang Z, Zhang X (2011) Secure image encryption without size limitation using Arnold transform and random strategies. J Multimed 6(2):202–206
-
(2011)
J Multimed
, vol.6
, Issue.2
, pp. 202-206
-
-
Tang, Z.1
Zhang, X.2
-
16
-
-
84874784902
-
Perceptual image hashing using local entropies and DWT
-
Tang Z, Zhang X, Dai Y, Lan W (2013) Perceptual image hashing using local entropies and DWT. Imaging Sci J 61(2):241–251
-
(2013)
Imaging Sci J
, vol.61
, Issue.2
, pp. 241-251
-
-
Tang, Z.1
Zhang, X.2
Dai, Y.3
Lan, W.4
-
17
-
-
84937818043
-
-
The SSIM Index for Image Quality Assessment. [Online]
-
The SSIM Index for Image Quality Assessment. [Online] Available: http://www.cns.nyu.edu/lcv/ssim/
-
-
-
-
18
-
-
84937812007
-
-
USC-SIPI Image Database. [Online]
-
USC-SIPI Image Database. [Online] Available: http://sipi.usc.edu/database/
-
-
-
-
19
-
-
2942661839
-
Image scrambling without bandwidth expansion
-
Van De Ville D, Philips W, Van de Walle R, Lemanhieu I (2004) Image scrambling without bandwidth expansion. IEEE Trans Circ Syst Video Technol 14(6):892–897
-
(2004)
IEEE Trans Circ Syst Video Technol
, vol.14
, Issue.6
, pp. 892-897
-
-
Van De Ville, D.1
Philips, W.2
Van de Walle, R.3
Lemanhieu, I.4
-
20
-
-
0034444578
-
Robust image hashing. In: Proc. of International Conference on Image Processing (ICIP), pp
-
Venkatesan R, Koon S M, Jakubowski M H, Moulin P (2000) Robust image hashing. In: Proc. of International Conference on Image Processing (ICIP), pp. 664–666
-
(2000)
664–666
-
-
Venkatesan, R.1
Koon, S.M.2
Jakubowski, M.H.3
Moulin, P.4
-
21
-
-
1942436689
-
Image quality assessment: from error visibility to structural similarity
-
Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Proc 13(4):600–612
-
(2004)
IEEE Trans Image Proc
, vol.13
, Issue.4
, pp. 600-612
-
-
Wang, Z.1
Bovik, A.C.2
Sheikh, H.R.3
Simoncelli, E.P.4
-
22
-
-
84865680083
-
Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain
-
Wang Q, Guo Q, Zhou J (2012) Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain. Opt Commun 285(21–22):4317–4323
-
(2012)
Opt Commun
, vol.285
, Issue.21-22
, pp. 4317-4323
-
-
Wang, Q.1
Guo, Q.2
Zhou, J.3
-
23
-
-
20444450903
-
A fast image-scramble method using public-key encryption allowing backward compatibility with JPEG2000. In: Proc. of International Conference on Image Processing (ICIP), pp
-
Watanabe O, Nakazaki A, Kiya H (2004) A fast image-scramble method using public-key encryption allowing backward compatibility with JPEG2000. In: Proc. of International Conference on Image Processing (ICIP), pp. 3435–3438
-
(2004)
3435–3438
-
-
Watanabe, O.1
Nakazaki, A.2
Kiya, H.3
-
24
-
-
84870053104
-
Local Shannon entropy measure with statistical tests for image randomness
-
Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323–342
-
(2013)
Inf Sci
, vol.222
, pp. 323-342
-
-
Wu, Y.1
Zhou, Y.2
Saveriades, G.3
Agaian, S.4
Noonan, J.P.5
-
25
-
-
38849134763
-
Huang J (2007) Histogram-based image hashing scheme robust against geometric deformations
-
New York, NY: USA
-
Xiang S, Kim H J, Huang J (2007) Histogram-based image hashing scheme robust against geometric deformations. In: Proceedings of the 9th Workshop on Multimedia & Security, ACM, New York, NY, USA, pp. 121–128
-
Proceedings of the 9th Workshop on Multimedia & Security, ACM
, pp. 121-128
-
-
Xiang, S.1
Kim, H.J.2
-
26
-
-
79955002664
-
A novel image encryption method based on total shuffling scheme
-
Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780
-
(2011)
Opt Commun
, vol.284
, Issue.12
, pp. 2775-2780
-
-
Zhang, G.1
Liu, Q.2
-
27
-
-
84655176477
-
Image encryption using P-Fibonacci transform and decomposition
-
Zhou Y, Panetta K, Agaian S, Philip Chen CL (2012) Image encryption using P-Fibonacci transform and decomposition. Opt Commun 285(5):594–608
-
(2012)
Opt Commun
, vol.285
, Issue.5
, pp. 594-608
-
-
Zhou, Y.1
Panetta, K.2
Agaian, S.3
Philip Chen, C.L.4
-
28
-
-
40349091694
-
-
of International Conference on Intelligent Information Hiding and Multimedia, Signal Processing (IIH-MSP)
-
Zhu L, Li W, Liao L, Li H (2006) A novel algorithm for scrambling digital image based on cat chaotic mapping. In: Proc. of International Conference on Intelligent Information Hiding and Multimedia, Signal Processing (IIH-MSP), pp. 601–604
-
(2006)
A novel algorithm for scrambling digital image based on cat chaotic mapping. In: Proc
, pp. 601-604
-
-
Zhu, L.1
Li, W.2
Liao, L.3
Li, H.4
|