Efficient implementation of chaotic image encryption in transform domains

EA Naeem, MM Abd Elnaby, NF Soliman… - Journal of Systems and …, 2014 - Elsevier
The primary goal of this paper is security management in data image transmission and
storage. Because of the increased use of images in industrial operations, it is necessary to …

Fusion-based encryption scheme for cancelable fingerprint recognition

FG Hashad, O Zahran, ESM El-Rabaie… - Multimedia Tools and …, 2019 - Springer
This paper presents a fingerprint image encryption scheme based on fingerprint image
fusion with another visible image that is rich in details. The encryption process is performed …

A selective image encryption based on square-wave shuffling with orthogonal polynomials transformation suitable for mobile devices

R Krishnamoorthi, P Murali - Multimedia Tools and Applications, 2017 - Springer
In this paper, a selective image encryption algorithm based on square-wave shuffling in the
orthogonal polynomials domain is proposed. This algorithm is adaptive to the user device's …

Denoising and error correction in noisy AES-encrypted images using statistical measures

N Islam, Z Shahid, W Puech - Signal Processing: Image Communication, 2016 - Elsevier
Cryptography based techniques are used to secure confidential data from unauthorized
access. These techniques are very good for the security and protection of the data but are …

Wavelet fusion for encrypting images with a few details

EA Naeem, MM Abd Elnaby, HS El-sayed… - Computers & Electrical …, 2016 - Elsevier
This paper introduces a new scheme for encrypting images with a few details based on
wavelet fusion. In this scheme, the image with a few details to be encrypted is fused with …

Dual Image Cryptosystem Using Henon Map and Discrete Fourier Transform.

H Alhumyani - Intelligent Automation & Soft Computing, 2023 - search.ebscohost.com
This paper introduces an efficient image cryptography system. The proposed image
cryptography system is based on employing the two-dimensional (2D) chaotic henon map …

New audio encryption package for TV cloud computing

SMS Eldin, SA Khamis, AAIM Hassanin… - International Journal of …, 2015 - Springer
For any cloud computing (ClComp), encryption of multimedia is one of the main applications
as cloud tries to maintain it in a good situation and protect from any tampering. This work …

Sparse Matrix Based Low-Complexity, Recursive, and Radix-2 Algorithms for Discrete Sine Transforms

SM Perera, LE Lingsch - IEEE Access, 2021 - ieeexplore.ieee.org
This paper presents factorizations of each discrete sine transform (DST) matrix of types I, II,
III, and IV into a product of sparse, diagonal, bidiagonal, and scaled orthogonal matrices …

Selective region encryption using a fast shape adaptive transform

REL Metzler, SS Agaian - 2010 IEEE International Conference …, 2010 - ieeexplore.ieee.org
Selective regional encryption was performed on nonrectangular, statistically relevant
regions of image media by permutation of coefficients in the domain of a fast, shape …

[PDF][PDF] Comparative Performance of Image Scrambling in Transform Domain using Sinusoidal Transforms

HB Kekre, T Sarode, PN Halarnkar… - International Journal of …, 2014 - Citeseer
With the rapid development of technology, and the popularization of internet, communication
is been greatly promoted. The communication is not limited only to information but also …