G Ye - Pattern Recognition Letters, 2010 - Elsevier
This paper presents an image scrambling encryption algorithm of pixel bit based on chaos map. The algorithm takes advantage of the best features of chaos maps, such as their …
V Patidar, NK Pareek, KK Sud - Communications in Nonlinear Science and …, 2009 - Elsevier
In this paper, we propose a new loss-less symmetric image cipher based on the widely used substitution–diffusion architecture which utilizes chaotic standard and logistic maps. It is …
W Puech, M Chaumont… - … , and watermarking of …, 2008 - spiedigitallibrary.org
Since several years, the protection of multimedia data is becoming very important. The protection of this multimedia data can be done with encryption or data hiding algorithms. To …
Recently, an image scrambling encryption algorithm of pixel bit based on chaos map was proposed. Considering the algorithm as a typical binary image scrambling/permutation …
SS Maniccam, NG Bourbakis - Pattern recognition, 2004 - Elsevier
This paper presents a new method for image and video encryption and a first stage lossy video compression based on frames difference before the encryption. The encryption …
S Li, C Li, G Chen, NG Bourbakis, KT Lo - Signal Processing: Image …, 2008 - Elsevier
In recent years secret permutations have been widely used for protecting different types of multimedia data, including speech files, digital images and videos. Based on a general …
E Hasanzadeh, M Yaghoobi - Multimedia Tools and Applications, 2020 - Springer
In this paper, a novel color image encryption scheme based on fractals, substitution box and hyper chaotic dynamic is proposed. In the first step, fractal images are generated by Julia …
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security …
C Li, S Li, M Asim, J Nunez, G Alvarez… - Image and vision …, 2009 - Elsevier
This paper studies the security of a recently-proposed chaos-based image encryption scheme and points out the following problems:(1) there exist a number of invalid keys and …