-
1
-
-
84938801478
-
Image encryption techniques: a selected review
-
Kaur, R., Singh, E.K.: Image encryption techniques: a selected review. J. Comput. Eng. 9(6), 80–83 (2013)
-
(2013)
J. Comput. Eng.
, vol.9
, Issue.6
, pp. 80-83
-
-
Kaur, R.1
Singh, E.K.2
-
2
-
-
84865689343
-
A new image cipher in time and frequency domains
-
Abd El-Latif, A., Niu, X., Amin, M.: A new image cipher in time and frequency domains. Opt. Commun. 285(21–22), 4241–4251 (2012)
-
(2012)
Opt. Commun.
, vol.285
, Issue.21-22
, pp. 4241-4251
-
-
Abd El-Latif, A.1
Niu, X.2
Amin, M.3
-
3
-
-
77953306215
-
Performance evaluation of DES and Blowfish algorithms
-
Nie, T., Song, C., Zhi, X.: Performance evaluation of DES and Blowfish algorithms. In: Proceedings of the International Conference on Biomedical Engineering and Computer Science, Wuhan, pp. 1–4 (2010)
-
(2010)
Proceedings of the International Conference on Biomedical Engineering and Computer Science, Wuhan
, pp. 1-4
-
-
Nie, T.1
Song, C.2
Zhi, X.3
-
4
-
-
85018112213
-
Advance cryptography algorithm for symmetric image encryption and decryption scheme for improving data security
-
Ganeshkumar, K., Arivazhagan, D., Sundaram, S.: Advance cryptography algorithm for symmetric image encryption and decryption scheme for improving data security. J. Acad. Ind. Res. 2(10), 563–566 (2014)
-
(2014)
J. Acad. Ind. Res.
, vol.2
, Issue.10
, pp. 563-566
-
-
Ganeshkumar, K.1
Arivazhagan, D.2
Sundaram, S.3
-
5
-
-
84929254547
-
A review of color image encryption techniques
-
Jawad, L.M., Sulong, G.: A review of color image encryption techniques. Int. J. Comput. Sci. Issues 10(6), 266–275 (2013)
-
(2013)
Int. J. Comput. Sci. Issues
, vol.10
, Issue.6
, pp. 266-275
-
-
Jawad, L.M.1
Sulong, G.2
-
6
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656–715 (1949)
-
(1949)
Bell Syst. Tech. J.
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
7
-
-
84923618485
-
Chaotic map cryptography and security
-
Nova Science, New York
-
Pisarchik, A.N., Zanin, M.: Chaotic map cryptography and security. In: Encryption: Methods, Software and Security, pp. 1–28. Nova Science, New York (2010)
-
(2010)
Encryption: Methods, Software and Security
, pp. 1-28
-
-
Pisarchik, A.N.1
Zanin, M.2
-
8
-
-
84904704041
-
A chaos based method for efficient cryptographic S-box design
-
Springer, India
-
Ahmad, M., Chugh, H., Goel, A., Singla, P.: A chaos based method for efficient cryptographic S-box design. In: Thampi, S.M., Atrey, P.K., Fan, C., Prez, G.M. (eds.) Security in Computing and Communications-International Symposium. Proceedings of Communications in Computer and Information Science, vol. 377, pp. 130–137. Springer, India (2013)
-
(2013)
Security in Computing and Communications-International Symposium. Proceedings of Communications in Computer and Information Science, vol. 377
, pp. 130-137
-
-
Ahmad, M.1
Chugh, H.2
Goel, A.3
Singla, P.4
Thampi, S.M.5
Atrey, P.K.6
Fan, C.7
Prez, G.M.8
-
11
-
-
78650268642
-
Image encryption techniques using chaotic schemes: a review
-
Sharma, M., Kowar, M.K.: Image encryption techniques using chaotic schemes: a review. Int. J. Eng. Sci. Technol. 2(6), 2359–2363 (2010)
-
(2010)
Int. J. Eng. Sci. Technol.
, vol.2
, Issue.6
, pp. 2359-2363
-
-
Sharma, M.1
Kowar, M.K.2
-
12
-
-
84897735810
-
A study on different techniques for security of an image
-
Parameshachari, B.D., Soyjaudah, K.M.S., Chaitanyakumar, M.V.: A study on different techniques for security of an image. Int. J. Recent Technol. Eng. 1(6), 14–19 (2013)
-
(2013)
Int. J. Recent Technol. Eng.
, vol.1
, Issue.6
, pp. 14-19
-
-
Parameshachari, B.D.1
Soyjaudah, K.M.S.2
Chaitanyakumar, M.V.3
-
13
-
-
84938976911
-
Survey of Chaos based Image encryption and decryption techniques
-
New York: USA
-
Ephin, M., Vasanthi, N.A., Joy, J. A.: Survey of Chaos based Image encryption and decryption techniques. In: International Journal of Computer Applications. Proceedings of the 2rd International Conference on Amrita International Conference of Women in Computing, vol. 2, pp. 1–5. New York, USA (2013)
-
(2013)
International Journal of Computer Applications. Proceedings of the 2rd International Conference on Amrita International Conference of Women in Computing, vol. 2
, pp. 1-5
-
-
Ephin, M.1
Vasanthi, N.A.2
Joy, J.A.3
-
14
-
-
84953635000
-
Description of a new variable-length key, 64-bit block Cipher (Blowfish)
-
Springer, Berlin
-
Schneier, B.: Description of a new variable-length key, 64-bit block Cipher (Blowfish). In: Anderson, R. (ed.) Fast Software Encryption. FSE 1993. Lecture Notes in Computer Science, vol. 809, pp. 191–204. Springer, Berlin (1994)
-
(1994)
Fast Software Encryption. FSE 1993. Lecture Notes in Computer Science, vol. 809
, pp. 191-204
-
-
Schneier, B.1
Anderson, R.2
-
15
-
-
84891750935
-
Security analysis of blowfish algorithm
-
Al-Abiachi, A., Ahmad, F., Mahmod, R.: Security analysis of blowfish algorithm. In: Proceedings of the 2nd International Conference on Informatics and Applications, Lodz, Poland, pp. 12–18 (2013)
-
(2013)
Proceedings of the 2nd International Conference on Informatics and Applications, Lodz, Poland
, pp. 12-18
-
-
Al-Abiachi, A.1
Ahmad, F.2
Mahmod, R.3
-
16
-
-
84925408472
-
A study of new trends in Blowfish algorithm
-
Singh, G., Kumar, A., Sandha, K.S.: A study of new trends in Blowfish algorithm. Int. J. Eng. Res. Appl. 1(2), 321–326 (2011)
-
(2011)
Int. J. Eng. Res. Appl.
, vol.1
, Issue.2
, pp. 321-326
-
-
Singh, G.1
Kumar, A.2
Sandha, K.S.3
-
17
-
-
84930013293
-
Guarding images using a symmetric key cryptographic technique: Blowfish algorithm
-
Jaleel, J.A., Thomas, J.M.: Guarding images using a symmetric key cryptographic technique: Blowfish algorithm. Int. J. Eng. Innov. Technol. 3(2), 196–201 (2013)
-
(2013)
Int. J. Eng. Innov. Technol.
, vol.3
, Issue.2
, pp. 196-201
-
-
Jaleel, J.A.1
Thomas, J.M.2
-
18
-
-
85018132744
-
Image encryption using Blowfish and genetic algorithm
-
Nemade, V., Wang, R.B.: Image encryption using Blowfish and genetic algorithm. Int. J. Comput. Technol. Appl. 3(6), 1067–1070 (2012)
-
(2012)
Int. J. Comput. Technol. Appl.
, vol.3
, Issue.6
, pp. 1067-1070
-
-
Nemade, V.1
Wang, R.B.2
-
19
-
-
85018126186
-
A novel approach for image encryption by new M box encryption algorithm using block based transformation along with shuffle operation
-
Pandey, U., Manoria, M., Jain, J.: A novel approach for image encryption by new M box encryption algorithm using block based transformation along with shuffle operation. Int. J. Comput. Appl. 42(1), 9–15 (2012)
-
(2012)
Int. J. Comput. Appl.
, vol.42
, Issue.1
, pp. 9-15
-
-
Pandey, U.1
Manoria, M.2
Jain, J.3
-
20
-
-
84893719384
-
Image security using encryption based algorithm
-
Kaur, R., Banga, V.K.: Image security using encryption based algorithm. In: Proceedings of the International Conference on Trends in Electrical, Electronics and Power Engineering, Singapore, pp. 110–112 (2012)
-
(2012)
Proceedings of the International Conference on Trends in Electrical, Electronics and Power Engineering, Singapore
, pp. 110-112
-
-
Kaur, R.1
Banga, V.K.2
-
21
-
-
84919709465
-
A comprehensive layer based encryption method for visual data
-
Rad, R.M., Attar, A., Atani, R.E.: A comprehensive layer based encryption method for visual data. Int. J. Signal Process. Image Process. Pattern Recogn. 6(1), 37–48 (2013)
-
(2013)
Int. J. Signal Process. Image Process. Pattern Recogn
, vol.6
, Issue.1
, pp. 37-48
-
-
Rad, R.M.1
Attar, A.2
Atani, R.E.3
-
22
-
-
85018132004
-
Design and implementation of an improvement of Blowfish encryption algorithm
-
Hashim, A.T., Al-Qarrawy, S.M., Mahdi, J.A.: Design and implementation of an improvement of Blowfish encryption algorithm. Iraqi J. Comput. Commun. Control Syst. Eng. 9(1), 95–109 (2009)
-
(2009)
Iraqi J. Comput. Commun. Control Syst. Eng.
, vol.9
, Issue.1
, pp. 95-109
-
-
Hashim, A.T.1
Al-Qarrawy, S.M.2
Mahdi, J.A.3
-
23
-
-
85018128063
-
Performance evaluation of different cryptographic algorithms: DES, 3DES, AES, IDEA and BLOWFISH
-
Alam, I., Khan, M.R.: Performance evaluation of different cryptographic algorithms: DES, 3DES, AES, IDEA and BLOWFISH. Int. J. Adv. Res. Innov. 2(10), 203–210 (2013)
-
(2013)
Int. J. Adv. Res. Innov.
, vol.2
, Issue.10
, pp. 203-210
-
-
Alam, I.1
Khan, M.R.2
-
25
-
-
85039964079
-
Cryptography with Chaos
-
Athens, Greece
-
Makris, G., Antoniou, I.: Cryptography with Chaos. In: Proceedings of the 5th International Conference on Chaotic Modeling and Simulation, vol. 1, pp. 309–317. Athens, Greece (2012)
-
(2012)
Proceedings of the 5th International Conference on Chaotic Modeling and Simulation, vol. 1
, pp. 309-317
-
-
Makris, G.1
Antoniou, I.2
-
26
-
-
84995410529
-
Comparative analysis and implementation of image encryption algorithms
-
Kaur, R., Singh, Er K.: Comparative analysis and implementation of image encryption algorithms. Int. J. Comput. Sci. Mob. Comput. 2(4), 170–176 (2013)
-
(2013)
Int. J. Comput. Sci. Mob. Comput.
, vol.2
, Issue.4
, pp. 170-176
-
-
Kaur, R.1
Singh, E.K.2
-
27
-
-
84929232430
-
A novel image encryption approach based on chaotic piecewise map
-
Wang, L., Liao, X.: A novel image encryption approach based on chaotic piecewise map. J. Theor. Phys. Cryptogr. 1, 37–40 (2012)
-
(2012)
J. Theor. Phys. Cryptogr.
, vol.1
, pp. 37-40
-
-
Wang, L.1
Liao, X.2
-
28
-
-
85018123943
-
Improved image encryption algorithm using chaotic map
-
Joshi, R.A., Joshi, S.S., Bhole, G.P.: Improved image encryption algorithm using chaotic map. Int. J. Comput. Appl. 32(9), 6–10 (2011)
-
(2011)
Int. J. Comput. Appl.
, vol.32
, Issue.9
, pp. 6-10
-
-
Joshi, R.A.1
Joshi, S.S.2
Bhole, G.P.3
-
29
-
-
84938996799
-
-
, Volume 3: Miscellaneous, retrieved in May (2013)
-
http://sipi.usc.edu/dataset, Volume 3: Miscellaneous, retrieved in May (2013)
-
-
-
-
30
-
-
84904385838
-
A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process
-
Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S.M., Mosavi, M.R.: A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed. Tools Appl. 61(2), 1–29 (2012)
-
(2012)
Multimed. Tools Appl.
, vol.61
, Issue.2
, pp. 1-29
-
-
Norouzi, B.1
Mirzakuchaki, S.2
Seyedzadeh, S.M.3
Mosavi, M.R.4
-
31
-
-
84910132328
-
A image encryption scheme based on dynamical perturbation and linear feedback shift register
-
Tong, X., Zhang, M., Wang, Z., Liu, Y.: A image encryption scheme based on dynamical perturbation and linear feedback shift register. Nonlinear Dyn. (2014). doi:10.1007/s11071-014-1564-1
-
(2014)
Nonlinear Dyn
-
-
Tong, X.1
Zhang, M.2
Wang, Z.3
Liu, Y.4
-
32
-
-
85016121103
-
A new image encryption approach using the integration of A shifting technique and the AES algorithm
-
Abugharsa, A.B., Basari, A.S.B.H., Almangush, H.: A new image encryption approach using the integration of A shifting technique and the AES algorithm. Int. J. Comput. Appl. 42(9), 38–45 (2012)
-
(2012)
Int. J. Comput. Appl
, vol.42
, Issue.9
, pp. 38-45
-
-
Abugharsa, A.B.1
Basari, A.S.B.H.2
Almangush, H.3
-
33
-
-
84893869855
-
Using 3-cell chaotic map for image encryption based on biological operations
-
SaberiKamarposhti, M., Mohammad, D., Rahim, M.S.M., Yaghobi, M.: Using 3-cell chaotic map for image encryption based on biological operations. Nonlinear Dyn. 75(3), 407–416 (2014)
-
(2014)
Nonlinear Dyn.
, vol.75
, Issue.3
, pp. 407-416
-
-
SaberiKamarposhti, M.1
Mohammad, D.2
Rahim, M.S.M.3
Yaghobi, M.4
-
34
-
-
84873618082
-
A new image encryption approach using block-based on shifted algorithm
-
Abugharsa, A.B., Basari, A.S.B.H., Almangush, H.: A new image encryption approach using block-based on shifted algorithm. Int. J. Comput. Sci. Netw. Secur. 11(12), 123–130 (2011)
-
(2011)
Int. J. Comput. Sci. Netw. Secur.
, vol.11
, Issue.12
, pp. 123-130
-
-
Abugharsa, A.B.1
Basari, A.S.B.H.2
Almangush, H.3
-
35
-
-
84862830313
-
An improved chaotic cryptosystem based on circular bit shift and XOR operations
-
Xu, S.-J., Chen, X.-B., Zhang, R., Yang, Y.-X., Guo, Y.-C.: An improved chaotic cryptosystem based on circular bit shift and XOR operations. Phys. Lett. A 376(10–11), 1003–1010 (2012)
-
(2012)
Phys. Lett. A
, vol.376
, Issue.10-11
, pp. 1003-1010
-
-
Xu, S.-J.1
Chen, X.-B.2
Zhang, R.3
Yang, Y.-X.4
Guo, Y.-C.5
-
36
-
-
84893867145
-
A novel image encryption algorithm based on dynamic S-boxes constructed by chaos
-
Wang, X., Wang, Q.: A novel image encryption algorithm based on dynamic S-boxes constructed by chaos. Nonlinear Dyn. 75(3), 567–576 (2013)
-
(2013)
Nonlinear Dyn.
, vol.75
, Issue.3
, pp. 567-576
-
-
Wang, X.1
Wang, Q.2
-
37
-
-
84901194220
-
A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme
-
Chen, J., Zhu, Z., Yu, H.: A fast chaos-based symmetric image cryptosystem with an improved diffusion scheme. Optik Int. J. Light Electron Opt. 125(11), 2472–2478 (2014)
-
(2014)
Optik Int. J. Light Electron Opt.
, vol.125
, Issue.11
, pp. 2472-2478
-
-
Chen, J.1
Zhu, Z.2
Yu, H.3
-
38
-
-
78049266776
-
Image encryption through using chaotic function and graph
-
Faridnia, S., Fae’z, K.: Image encryption through using chaotic function and graph. In: Proceedigns of the 1st International Conference on Computer Vision and Graphics, Warsaw, Poland, vol. 2, pp. 352–359 (2010)
-
(2010)
Proceedigns of the 1st International Conference on Computer Vision and Graphics, Warsaw, Poland, vol. 2
, pp. 352-359
-
-
Faridnia, S.1
Fae’z, K.2
-
39
-
-
78649545075
-
Image encryption using block-based transformation algorithm
-
Younes, M.A.B., Jantan, A.: Image encryption using block-based transformation algorithm. Int. J. Comput. Sci. 35(1), 15–23 (2008)
-
(2008)
Int. J. Comput. Sci.
, vol.35
, Issue.1
, pp. 15-23
-
-
Younes, M.A.B.1
Jantan, A.2
-
40
-
-
84855991656
-
Digital image encryption based on the RC5 block cipher algorithm
-
Faragallah, O.S.: Digital image encryption based on the RC5 block cipher algorithm. Sens. Imaging 12(3–4), 73–94 (2011)
-
(2011)
Sens. Imaging
, vol.12
, Issue.3-4
, pp. 73-94
-
-
Faragallah, O.S.1
-
41
-
-
84898549485
-
Gray code permutation algorithm for high-dimensional data encryption
-
Zanin, M., Pisarchik, A.N.: Gray code permutation algorithm for high-dimensional data encryption. Inf. Sci. 270(20), 288–297 (2014)
-
(2014)
Inf. Sci.
, vol.270
, Issue.20
, pp. 288-297
-
-
Zanin, M.1
Pisarchik, A.N.2
|