Novel Approach for fast Compressed Hybrid color image Cryptosystem
Tài liệu tham khảo
Pommer, 2003, Selective encryption of wavelet-packet encoded image data: efficiency and security, Multimedia Syst, 9, 279, 10.1007/s00530-003-0099-y
Kuo, 1993, Novel image encryption technique and its application in progressive transmission, J Electron Imag, 2, 345, 10.1117/12.148572
Li, 2008, Cryptanalysis of an image encryption scheme based on a compound chaotic sequence, Image Vision Comput, 27, 1035, 10.1016/j.imavis.2008.09.004
Newton, 1997
Huang Feng, Feng Yong. An image encryption approach based on a new two-dimensional map. IEEE 0-7695-2745-0/06; 2006.
FIPS, 2000, Digital signature standard, Federal Information Processing Standards Publication, 186
Chen, 2004, A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos Solitons Fractals, 21, 749, 10.1016/j.chaos.2003.12.022
Alvarez, 2007, Analysis of security problems in a medical encryption system, Comput Biol Med, 37, 424, 10.1016/j.compbiomed.2006.04.002
Alvarez, 2009, Crypt analyzing a nonlinear chaotic algorithm (NCA) for image encryption, Commun Nonlinear Sci Numer Simul, 14, 3743, 10.1016/j.cnsns.2009.02.033
Chang HK, Liou JL. An image encryption scheme based on quadtree compression scheme. In: Proceedings of the international computer symposium, Taiwan; 1994. p. 230–7.
Nien HH, Changchien SK, Wu SY, Huang CK. A new pixel-chaotic-shuffle method for image encryption. In: The 10th international conference on control, automation, robotics and vision (ICARCV); 2008. p. 883–7.
Ahmed, 2007, An efficient chaos based feedback stream cipher (ECBFSC) for image encryption and decryption, ACM Inform, 31, 121
Yen JC, Guo JI. A new chaotic key-based design for image encryption and decryption. In: Proc of IEEE international symposium circ syst, vol. 4; 2000. p. 49–52.
Fridrich, 1998, Symmetric ciphers based on two-dimensional chaotic maps, Int J Bifurcat Chaos, 8, 1259, 10.1142/S021812749800098X
Liu, 2006, Efficient selective encryption for JPEG 2000 images using private initial table, Pattern Recogn, 39, 1509, 10.1016/j.patcog.2006.02.013
Scharinger, 1998, Fast encryption of image data using chaotic Kolmogorov flows, J Electron Imag, 7, 318, 10.1117/1.482647
Yoon, 2010, An image encryption scheme with a pseudorandom permutation based on chaotic maps, Commun Nonlinear Sci Numer Simul, 1
Martin, 2005, Efficient encryption of wavelet-based coded color image, Pattern Recogn, 38, 1111, 10.1016/j.patcog.2005.01.002
Hongjun, 2010, Color image encryption based on one-time keys and robust chaotic maps, J Comput Math Appl, 59, 3320, 10.1016/j.camwa.2010.03.017
Lian, 2005, Security analysis of a chaos based image encryption algorithm, Physica A, 351, 645, 10.1016/j.physa.2005.01.001
Bourbakis, 1992, Picture data encryption using SCAN patterns, Pattern Recogn, 25, 567, 10.1016/0031-3203(92)90074-S
Dang Philip P, Chau Paul M. Image encryption for secure internet multimedia applications. IEEE 0-7803-6301-9/00; 2000.
Rivest, 1978, A method for obtaining digital signatures and public-key cryptosystems, Commun ACM, 21, 120, 10.1145/359340.359342
Norcen, 2003, Confidential storage and transmission of medical image data, Comput Biol Med, 33, 277, 10.1016/S0010-4825(02)00094-X
Lian SG, Mao YB, Wang Z. Extension of some 2D chaotic maps and their usage in data Encryption. In: Proc of the fourth ICCA; 2003. p. 819–23.
Shapiro JM. An embedded wavelet hierarchical image coder using zero-tree of wavelet coefficients. In: Proc data compression conference, Snowbird, Utah, 1993IEEE ICASSP, San Francisco, CA, vol. 4; 1993. p. 657–60.
Lian, 2005, A block cipher based on a suitable use of chaotic standard map, Chaos Solitons Fract, 26, 117, 10.1016/j.chaos.2004.11.096
Li S, Li C, Chen G, Bourbakis G, Lo KT. A general cryptanalysis of permutation-only multimedia encryption algorithms. Available in IACR’s; 2004. <http://eprint.iacr.org/2004/374>.
Li S, Zheng X. Cryptanalysis of a chaotic image encryption method. In: Proc of IEEE international symposium circ syst, vol. 2; 2002. p. 708–11.
Li, 2008, A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks, Signal Proces Image Commun, 23, 212, 10.1016/j.image.2008.01.003
ElGamal, 1985, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans Inform Theory, 31, 469, 10.1109/TIT.1985.1057074
Diffie, 1976, New directions in cryptography, IEEE Trans Inform Theory, IT-vol. 22, 644, 10.1109/TIT.1976.1055638
Tong, 2009, Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator, Signal Proces, 89, 480, 10.1016/j.sigpro.2008.09.011
Mao, 2004, A novel fast image encryption scheme based on 3D chaotic baker map, Int J Bifurcat Chaos, 14, 3613, 10.1142/S021812740401151X
Wang, 2011, A new chaos-based fast image encryption algorithm, Appl Soft Comput, 2011, 514, 10.1016/j.asoc.2009.12.011
H Guan, 2005, Chaos-based image encryption algorithm, Phys Lett A, 346, 153, 10.1016/j.physleta.2005.08.006