Z Hua, Y Zhou - Information sciences, 2017 - Elsevier
The operation of image filtering is widely used to deblur digital images. However, using inappropriate masks, it can also blur images. Motivated by this concept, this paper …
In this technological era, it is highly essential to protect the digital medical data from the fraud and forgery as they are transmitted over the public channel. Also with the increased …
In this paper, we created new chaotic maps based on Beta function. The use of these maps is to generate chaotic sequences. Those sequences were used in the encryption scheme …
X Wu, B Zhu, Y Hu, Y Ran - IEEE Access, 2017 - ieeexplore.ieee.org
In recent years, the chaos-based cryptographic algorithms have attracted a lot of attention. Specially, chaotic tent map (CTM)-based schemes show some good performances in …
J Wu, X Liao, B Yang - Signal Processing, 2017 - Elsevier
Color image can provide more information than gray image, so it is used more widely in the field of the communication. In recent years, how to safely encrypt images has received …
Abstract Elliptic Curve Cryptography (ECC) has proven to be an effective cryptography. ECC has its own advantages such as efficient key size compared to other Public Key …
W Cao, Y Zhou, CLP Chen, L Xia - Signal Processing, 2017 - Elsevier
This paper presents a medical image encryption algorithm using edge maps derived from a source image. The algorithm is composed by three parts: bit-plane decomposition, generator …
P Li, KT Lo - IEEE Transactions on Multimedia, 2017 - ieeexplore.ieee.org
For joint image compression and encryption schemes, the encryption power and compression efficiency are commonly two contradictory things. In this paper, we propose a …
This paper introduces the design of a generalized fractional order logistic map suitable for pseudorandom number key generators and its application in an encryption system based on …