J Chen, Z Zhu, C Fu, L Zhang, Y Zhang - Nonlinear Dynamics, 2015 - Springer
This paper presents a solution to satisfy the increasing requirement of real-time secure image transmission over public networks. The main advantage of the proposed …
Z Tang, X Zhang, W Lan - Multimedia tools and applications, 2015 - Springer
Image encryption is a useful technique for many applications, such as image content protection, image authentication, pay-TV and data hiding. In this paper, we propose an …
J Chen, Z Zhu, C Fu, H Yu, L Zhang - Optics and Lasers in Engineering, 2015 - Elsevier
In recent years, the operation efficiency of chaos-based image cryptosystems has drawn much more concerns. However, the workload arised from floating point arithmetic in chaotic …
HI Hsiao, J Lee - Signal Processing, 2015 - Elsevier
This paper presents a new multiple chaos-based biometric image cryptosystem for fingerprint security. This encryption algorithm is constructed with four chaotic systems, which …
An encryption scheme for colour images using a spatiotemporal chaotic system is proposed. Initially, we use the R, G and B components of a colour plain-image to form a matrix. Then …
A novel chaotic, permutation-substitution architecture based, grayscale images' encryption algorithm is introduced in this paper. To reduce the redundancies of Fridrich's structure …
J BalaSuyambu, R Radha, R Rama - arXiv preprint arXiv:1505.00920, 2015 - arxiv.org
In this paper we have proposed a new test for pixel randomness using non-parametric method in statistics. In order to validate this new non-parametric test we have designed an …
Y Khmou, S Safi, M Frikel - International Journal of Nuclear and Quantum …, 2015 - Citeseer
This paper treats different aspects of entropy measure in classical information theory and statistical quantum mechanics, it presents the possibility of extending the definition of Von …
S Sharma - International Journal of Computer Applications - Citeseer
Security has become an important issue with the proliferation of digital communication. Multimedia sources such as images plays an important role in security of data …