Create New Account
Login
Search or Buy Articles
Browse Journals
Browse Proceedings
Submit your Paper
Submission Information
Journal Review
Recommend to Your Library
Call for Papers
AN EFFICIENT ADAPTIVE ERGODIC MATRIX AND CHAOTIC SYSTEM FOR IMAGE ENCRYPTION
I.A. Ismail, M. Amin, and H. Diab
References
[1] G. Chen, Y. Mao, & C. K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, chaos, Soliton and Fractals 21, 2004, 749–761.
[2] N.K. Pareek, V. Patidar, & K.K. Sud, Image encryption using chaotic logistic map,
Image and Vision Computing, 24
, 2006, 926–934.
[3] N.G. Bourbakis & C. Alexopoulos, Picture data encryption using SCAN patterns,
Pattern Recognition, 25
(6), 1992, 567–581.
[4] C. Alexopoulos, N.G. Bourbakis, & N. Ioannou, Image encryption method using a class of fratcals,
Journal of Electronic Imaging, 4
(3), 1995, 251–259.
[5] H.K.C. Chang & J.L. Liu, A linear quadtree compression scheme for image encryption,
Signal Processing: Image Communication, 10
(4), 1997, 279–290.
[6] R. Zunino, Fractal circuit layout for spatial decorrelation of images,
Electronics Letters, 34
(20), 1998, 1929–1930.
[7] K.L. Chung & L.C. Chang, Large encryption binary imageswith higher security,
Pattern Recognition Letters, 19
(5–6), 1998, 461–468.
[8] J.C. Yen & J.I. Guo, A new chaotic image encryption algorithm, in
Proc. (Taiwan) National Symposium on Telecommunications
, 1998, 358–362.
[9] J.I. Guo, J.C. Yen, & J.-C. Yeh, The design and realization of a new chaotic image encryption algorithm, in
Proc. 1999 Int. Symp. on Communications
, 1999, 210–214.
[10] W. Zeng & S. Lei, Efficient frequency domain selective scrambling of digital video,
IEEE Transactions on Multimedia, 5
(1), 2003, 118–129.
[11] M.S. Kankanhalli & T.T. Guan, Compressed-domain scrambler/descrambler for digital video,
IEEE Transactions on Consuming Eletronics, 48
(2), 2002, 356–365.
[12] X.Y. Zhao & G. Chen, Ergodic matrix in image encryption,
Proc. Second International Conference on Image and Graphics
, ser. Proc. SPIE, 4875, 2002, 394–401.
[13] X.Y. Zhao, G. Chen, D. Zhang, X.-H. Wang, & G.C. Dong, Decryption of pure-position permutation algorithms,
Journal of Zhejiang University SCIENCE, 5
(7), 2004, 803–809.
[14] S. Li, et al., A general cryptanalysis of permutation-only multimedia encryption algorithms, 2004, the preprint is available at
http://www.hooklee.com/pub.html
[15] S. Li, G. Chen, & X. Zheng, Chaos-based encryption for digital images and videos, in B. Furht and D. Kirovski (Eds.),
Multimedia Security Handbook
, (CRC Press, 2004, ch. 4), the preprint at
http://www.hooklee.com/pub.html
.
[16] S. Li & X. Zheng, On the security of an image encryption method, ICIP2002 2002, the preprint is available
http://www.hooklee.com/Papers/ICIP2002.pdf
[17] Z.-H. Guan, F. Huang, & W. Guan, Chaos-based image encryption algorithm,
Physics Letter A, 346
, 2005, 153–157.
[18] K. Wang, W. Pei, L. Zou, A. Song, & Z. He, On the security of 3D cat map based symmetric image encryption scheme,
Physics Letter A, 343
, 2005, 432–439.
Important Links:
Abstract
DOI:
10.2316/Journal.202.2010.3.202-2330
From Journal
(202) International Journal of Computers and Applications - 2010
Go Back