High-quality visually secure image cryptosystem using improved Chebyshev map and 2D compressive sensing model
In this paper, we propose an improved Chebyshev map and a visually meaningful image
encryption (VMIE) algorithm based on two-dimensional compressive sensing (2DCS). First …
encryption (VMIE) algorithm based on two-dimensional compressive sensing (2DCS). First …
[HTML][HTML] Encryption of 3D or Higher-Dimensional Images: A Review
This article aims to review encryption techniques for 3D or higher-dimensional images.
Precisely, the following classes of images are considered: light field images, point clouds …
Precisely, the following classes of images are considered: light field images, point clouds …
Asymmetric image authentication algorithm using double random modulus decomposition and CGI
In this paper, we have proposed asymmetric image encryption cum authentication
cryptosystem based on double random modulus decomposition using computational ghost …
cryptosystem based on double random modulus decomposition using computational ghost …
Visually meaningful image encryption scheme using multi-parameter fractal theory and block synchronous sorting diffusion
Traditional visually meaningful image encryption (VMIE) works by embedding a secret
image (SI) into a visually meaningful carrier image (CAI), thus achieving the dual protection …
image (SI) into a visually meaningful carrier image (CAI), thus achieving the dual protection …
Light-field 3D image parallel encryption based on the state transition diagram of Maximum Length Cellular Automata
Y Cui, J Guo, C Shang, R Zheng, Q Wu, X Dai, C Li… - Optics …, 2024 - Elsevier
In our work, we proposed a parallel encryption scheme based on the state transition
diagram of Maximum Length Cellular Automata (MLCA) to protect 3D images. Compared …
diagram of Maximum Length Cellular Automata (MLCA) to protect 3D images. Compared …
Novel Duffing chaotic oscillator and its application to privacy data protection
Abstract Traditional Compressive Sensing (CS) achieves both compression and encryption
of digital data. However, most existing compressive sensing methods present some …
of digital data. However, most existing compressive sensing methods present some …
A new method for constructing discrete hyperchaotic systems with a controllable range of Lyapunov exponents and its application in information security
J Zeng, Y Wang, X Li, Y Guang, C Wang… - Physica Scripta, 2023 - iopscience.iop.org
Since people use chaos extensively for a wide range of applications in data encryption and
secure communications, a new method for designing practical high-dimensional discrete …
secure communications, a new method for designing practical high-dimensional discrete …
Light-field 3D encryption based on the monocular depth rendering
Z Ren, J Guo, H Liu, X Li - Optics Letters, 2022 - opg.optica.org
The real-time performance of light-field 3D encryption technology based on the integral
imaging principle is restricted by the acquisition speed and the data of the elemental image …
imaging principle is restricted by the acquisition speed and the data of the elemental image …
Color 3D display and security via monochrome scenes
J Guo, Y Kou, ST Kim, X Li - Optics Letters, 2023 - opg.optica.org
Color three-dimensional (3D) displays have always been the ideal display method because
of their strong sense of reality, whereas color 3D displays of monochrome scenes are still …
of their strong sense of reality, whereas color 3D displays of monochrome scenes are still …
3D image steganography using cellular automata transform and depth estimation network
X Liu, Q Wu, Z Zuo, Z Yang, H Zhang, L Dai, Y Liao… - Optics …, 2024 - Elsevier
Traditional 3D image steganography is cumbersome and difficult owing to the special
structure of 3D image, imposing a practical limit for its applications. Herein, we propose a 3D …
structure of 3D image, imposing a practical limit for its applications. Herein, we propose a 3D …