Chaos based efficient selective image encryption

JS Khan, J Ahmad - Multidimensional Systems and Signal Processing, 2019 - Springer
Due to social networks, demand for sharing multimedia data is significantly increased in last
decade. However, lower complexity and frequent security breaches on public network such …

A literature review on image encryption techniques

M Khan, T Shah - 3D Research, 2014 - Springer
Image encryption plays a paramount part to guarantee classified transmission and capacity
of image over web. Then again, a real-time image encryption confronts a more noteworthy …

An efficient and robust image encryption scheme for medical applications

A Kanso, M Ghebleh - … in Nonlinear Science and Numerical Simulation, 2015 - Elsevier
In this paper, we propose a novel full and selective chaos-based image encryption scheme
suitable for medical image encryption applications. The proposed approach consists of …

Combinational domain encryption for still visual data

N Taneja, B Raman, I Gupta - Multimedia Tools and Applications, 2012 - Springer
Image data has distinct regions of different importance. This property of image data has
extensively been used to develop partial encryption techniques, but it is still unnoticed for …

A novel plaintext-related image encryption scheme based on chaotic system and pixel permutation

Y Niu, X Zhang - IEEE Access, 2020 - ieeexplore.ieee.org
To improve the abilities of image encryption systems to resist plaintext attacks and
differential attacks, a novel plaintext-related image encryption scheme based on Josephus …

Image salient regions encryption for generating visually meaningful ciphertext image

W Wen, Y Zhang, Y Fang, Z Fang - Neural Computing and Applications, 2018 - Springer
Image feature encryption is comprised of feature extraction and feature encryption. The
existing feature encryption algorithms aim at extracting edge features as significant …

Partial image encryption algorithm using pixel position manipulation technique: The smart copyback system

BD Parameshachari, R Karappa… - … with applications in …, 2014 - ieeexplore.ieee.org
Nowadays, the most important locomotive to provide confidentiality is image encryption. In
real-time applications the classical and modern ciphers are not appropriate because of vast …

[PDF][PDF] A review of color image encryption techniques

LM Jawad, GB Sulong - International Journal of Computer Science Issues …, 2013 - Citeseer
Image encryption plays an important role to ensure confidential transmission and storage of
image over internet. However, a real–time image encryption faces a greater challenge due …

Analysis and comparison of fully layered image encryption techniques and partial image encryption techniques

P BD, KMS Soyjaudah - International Conference on Information …, 2012 - Springer
In traditional image and video content protection schemes, called fully layered, the whole
content is first compressed. Then, the compressed bitstream is entirely encrypted using a …

A non-adaptive partial encryption of grayscale images based on chaos

S Som, S Sen - Procedia Technology, 2013 - Elsevier
Research papers published in recent times have focused towards different kinds of image
encryption techniques. Image encryption based on Chaos became very popular for …