On the security of permutation-only image encryption schemes

A Jolfaei, XW Wu… - IEEE transactions on …, 2015 - ieeexplore.ieee.org
Permutation is a commonly used primitive in multimedia (image/video) encryption schemes,
and many permutation-only algorithms have been proposed in recent years for the …

[BOK][B] Multimedia security handbook

B Furht, D Kirovski - 2004 - books.google.com
Intellectual property owners who exploit new ways of reproducing, distributing, and
marketing their creations digitally must also protect them from piracy. Multimedia Security …

Chaos-based encryption for digital image and video

S Li, G Chen, X Zheng - Multimedia Encryption and Authentication …, 2006 - taylorfrancis.com
Many digital services, such as pay TV, confidential videoconferencing, and medical and
military imaging systems, require reliable security in storage and transmission of digital …

Secure partial image encryption scheme using scan based algorithm

BD Parameshachari, KMS Soyjaudah… - … Journal of advances …, 2013 - search.proquest.com
Today data security is very important and high priority topic. With rapid growth in
communication and computer technologies, there is a huge data transaction interment …

SCAN-based compression-encryption-hiding for video on demand

N Bourbakis, A Dollas - IEEE MultiMedia, 2003 - ieeexplore.ieee.org
We present a SCAN-based method for image and video compression-encryption-hiding with
application to digital video on demand. The software SCAN implementation running on a …

A hybrid gray image representation using spatial-and DCT-based approach with application to moment computation

KL Chung, YW Liu, WM Yan - Journal of Visual Communication and Image …, 2006 - Elsevier
In this paper, a novel hybrid gray image representation using spatial-and DCT-based
approach is presented. In the first phase, according to the bintree decomposition principle …

An image encryption technique using scan based approach and image as key

S Somaraj, M AliHussain - … of the First International Conference on …, 2017 - Springer
In this paper, a new algorithm for image encryption using the scan method is proposed.
Using SCAN language, it is possible to generate a wide range of scanning paths based on …

A novel algorithm for image encryption based on couple chaotic systems

XY Wang, T Wang - International Journal of Modern Physics B, 2012 - World Scientific
In this paper, an image encryption algorithm based on couple multiple chaotic systems is
presented. It made the one-dimensional Coupled Map Lattice (CML) formed by Skew Tent …

A chaos-based image encryption ASIC using reconfigurable logic

Y Zhang, Z Liu, X Zheng - APCCAS 2008-2008 IEEE Asia …, 2008 - ieeexplore.ieee.org
This paper proposes an ASIC implementation of a chaos-based image encryption algorithm,
which features dual-RAM connection and reusable data-path for each round of encryption …

[BOK][B] Research on digital image watermark encryption based on hyperchaos

P Wu - 2021 - search.proquest.com
The digital watermarking technique embeds meaningful information into one or more
watermark images hidden in one image, in which it is known as a secret carrier. It is difficult …