Survey on JPEG compatible joint image compression and encryption algorithms

P Li, KT Lo - IET Signal Processing, 2020 - Wiley Online Library
In recent years, image encryption has been broadly researched. Since a large proportion of
images on Internet are compressed, and JPEG is the most widely adopted standards for …

A content-adaptive joint image compression and encryption scheme

P Li, KT Lo - IEEE Transactions on Multimedia, 2017 - ieeexplore.ieee.org
For joint image compression and encryption schemes, the encryption power and
compression efficiency are commonly two contradictory things. In this paper, we propose a …

A comparative analysis of bark and leaf essential oil and their chemical composition, antioxidant, anti-inflammatory, antimicrobial activities and genotoxicity of North …

R Gogoi, N Sarma, R Loying, SK Pandey… - The Natural Products …, 2021 - ingentaconnect.com
Background: Cinnamomum zeylanicum Blume (Lauraceae) bark and leaf essential oil
possesses eugenol as the major component. Both the essential oils have the potential …

A prediction based encryption approach for telemedicine applications

G Vallathan, T Rajani, E Kumaraswamy… - IOP Conference Series …, 2020 - iopscience.iop.org
The rapid progression of health care technologies systems and transmission strategies
makes it reliable to gain, dispense and manage data over medical devices and as well …

Cryptography of medical images based on a combination between chaotic and neural network

M Dridi, MA Hajjaji, B Bouallegue… - IET Image …, 2016 - Wiley Online Library
This study presents a novel chaotic–neural network of image encryption and decryption
image applied to the domain of medical. The main objective behind the proposed technique …

[PDF][PDF] A review: image encryption techniques and its terminologies

A Oad, H Yadav, A Jain - International Journal of Engineering and …, 2014 - Citeseer
In today's environment, security becomes an important issue in communication. For secure
transmission of data in open network, encryption is very important methodology. Though …

[PDF][PDF] Permutation based image encryption technique

SP Indrakanti, PS Avadhani - International Journal of Computer …, 2011 - Citeseer
Information security is the key in the era of electronic data exchange. Images constitute a
large portion of the electronic data. Confidentiality of color images is a difficult process. Most …

Joint image encryption and compression schemes based on 16× 16 DCT

P Li, KT Lo - Journal of Visual Communication and Image …, 2019 - Elsevier
Joint image encryption and compression schemes have shown their great potential values
in protecting compressed images. To achieve the protection, a trade-off between encryption …

[PDF][PDF] A survey on different image encryption and decryption techniques

R Pakshwar, VK Trivedi, V Richhariya - International journal of computer …, 2013 - Citeseer
This paper focuses mainly on the different kinds of image encryption and decryption
techniques. In addition focuses on image encryption techniques, As the use digital …

Design and analysis of a novel digital image encryption scheme

NK Pareek - arXiv preprint arXiv:1204.1603, 2012 - arxiv.org
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In
the substitution process of the scheme, image is divided into blocks and subsequently into …