25.3.12.8 Encryption, Visual Cryptography, Authentication

Chapter Contents (Back)
Encryption. Image Encryption. Cryptography. Visual Cryptography. Not really watermarks. Usually the more specific papers.
See also Encryption or JPEG Coded Images, JPEG and Encryption.
See also Video Encryption, Video Cryptography, Authentication.

Scharinger, J.,
Fast Encryption of Image Data Using Chaotic Kolmogorov Flows,
JEI(7), No. 2, April 1998, pp. 318-325. 9807
BibRef

Chuang, T.J., Lin, J.C.,
New Approach to Image Encryption,
JEI(7), No. 2, April 1998, pp. 350-356. 9807
BibRef

Chung, K.L., Chang, L.C.,
Large Encrypting Binary Images with Higher Security,
PRL(19), No. 5-6, April 1998, pp. 461-468. 9808

See also Cryptanalysis of an encryption scheme for binary images. BibRef

Aikawa, M., Takaragi, K., Furuya, S., Sasamoto, M.,
A Lightweight Encryption Method Suitable For Copyright Protection,
Consumer(44), No. 3, August 1998, pp. 902-910. 9810
BibRef

Yen, J.C., Guo, J.I.,
Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation,
VISP(147), No. 2, April 2000, pp. 167. 0005
BibRef

Maniccam, S.S., Bourbakis, N.G.,
Lossless image compression and encryption using SCAN,
PR(34), No. 6, June 2001, pp. 1229-1245.
Elsevier DOI 0103
Encryption. BibRef

Maniccam, S.S., Bourbakis, N.G.,
Image and video encryption using SCAN patterns,
PR(37), No. 4, April 2004, pp. 725-737.
Elsevier DOI 0403
BibRef

Chang, C.C.[Chin-Chen], Chuang, J.C.[Jun-Chou],
An image intellectual property protection scheme for gray-level images using visual secret sharing strategy,
PRL(23), No. 8, June 2002, pp. 931-941.
Elsevier DOI 0204
BibRef

Chang, C.C.[Chin-Chen], Yu, T.X.[Tai-Xing],
Cryptanalysis of an encryption scheme for binary images,
PRL(23), No. 14, December 2002, pp. 1847-1852.
Elsevier DOI 0208
Shows how earlier method (
See also Large Encrypting Binary Images with Higher Security. ) can be broken. BibRef

Chang, C.C., Hwang, K.F., Hwang, M.S.,
Robust authentication scheme for protecting copyrights of images and graphics,
VISP(149), No. 1, February 2002, pp. 43-50.
IEEE Top Reference. 0205
BibRef

Alberti, C., Romeo, A., Mattavelli, M.,
Intellectual property management and protection for MPEG multimedia content: A structured language for interoperable IPMP systems,
IJIST(13), No. 5, 2003, pp. 275-288.
DOI Link 0312
BibRef

Lin, C.C.[Chang-Chou], Tsai, W.H.[Wen-Hsiang],
Visual cryptography for gray-level images by dithering techniques,
PRL(24), No. 1-3, January 2003, pp. 349-358.
Elsevier DOI 0211
BibRef

Hou, Y.C.[Young-Chang],
Visual cryptography for color images,
PR(36), No. 7, July 2003, pp. 1619-1629.
Elsevier DOI 0304
BibRef

Zhao, Y., Campisi, P., Kundur, D.,
Dual Domain Watermarking for Authentication and Compression of Cultural Heritage Images,
IP(13), No. 3, March 2004, pp. 430-448.
IEEE DOI 0404
BibRef

Maiorana, E.[Emanuele], Campisi, P.[Patrizio],
High-capacity watermarking of high dynamic range images,
JIVP(2016), No. 1, 2016, pp. 3.
DOI Link 1601
BibRef

Lukac, R.[Rastislav], Plataniotis, K.N.[Konstantinos N.],
Bit-level based secret sharing for image encryption,
PR(38), No. 5, May 2005, pp. 767-772.
Elsevier DOI 0501
BibRef
Earlier:
Document image secret sharing using bit-level processing,
ICIP04(V: 2893-2896).
IEEE DOI 0505
BibRef

Lukac, R.[Rastislav], Plataniotis, K.N.[Konstantinos N.],
A cost-effective encryption scheme for color images,
RealTimeImg(11), No. 5-6, October-December 2005, pp. 454-464.
Elsevier DOI 0510
BibRef

Heidarinejad, M.[Mohsen], Plataniotis, K.N.[Konstantinos N.],
A second generation Visual Secret Sharing scheme for color images,
ICIP08(481-484).
IEEE DOI 0810
BibRef

Celik, M.U., Sharma, G., Tekalp, A.M.,
Lossless Watermarking for Image Authentication: A New Framework and an Implementation,
IP(15), No. 4, April 2006, pp. 1042-1049.
IEEE DOI 0604
BibRef

Wang, R.Z.[Ran-Zan],
Region Incrementing Visual Cryptography,
SPLetters(16), No. 8, August 2009, pp. 659-662.
IEEE DOI 0906
BibRef

Amador, J.J.[José J.], Green, R.W.[Robert W.],
Symmetric-key block cipher for image and text cryptography,
IJIST(15), No. 3, 2005, pp. 178-188.
DOI Link 0510
BibRef

Pareek, N.K., Patidar, V.[Vinod], Sud, K.K.,
Image encryption using chaotic logistic map,
IVC(24), No. 9, September 2006, pp. 926-934.
Elsevier DOI 0608
Image cipher; Chaotic cryptography; Logistic map BibRef

Hu, C.M., Tzeng, W.G.,
Cheating Prevention in Visual Cryptography,
IP(16), No. 1, January 2007, pp. 36-45.
IEEE DOI 0701

See also Comment on Cheating Prevention in Visual Cryptography. BibRef

Chen, R.J.[Rong-Jian], Lai, J.L.[Jui-Lin],
Image security system using recursive cellular automata substitution,
PR(40), No. 5, May 2007, pp. 1621-1631.
Elsevier DOI 0702
Image processing; Cellular automata; Image security; Encryption; Decryption BibRef

Wang, D.S.[Dao-Shun], Zhang, L.[Lei], Ma, N.[Ning], Li, X.B.[Xiao-Bo],
Two secret sharing schemes based on Boolean operations,
PR(40), No. 10, October 2007, pp. 2776-2785.
Elsevier DOI 0707
Secret sharing scheme; Visual secret sharing; Visual cryptography; Computation complexity; Pixel expansion BibRef

Yang, C.N.[Ching-Nung], Yu, K.H.[Kun-Hsuan], Lukac, R.[Rastislav],
User-friendly image sharing using polynomials with different primes,
IJIST(17), No. 1, 2007, pp. 40-47.
DOI Link 0707
BibRef

Lin, S.J.[Sian-Jheng], Lin, J.C.[Ja-Chen],
VCPSS: A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches,
PR(40), No. 12, December 2007, pp. 3652-3666.
Elsevier DOI 0709
Hiding using block-types; Image sharing; (t,n) threshold scheme; Halftone version; Compression BibRef

Shyu, S.J.[Shyong Jian], Huang, S.Y.[Shih-Yu], Lee, Y.K.[Yeuan-Kuen], Wang, R.Z.[Ran-Zan], Chen, K.[Kun],
Sharing multiple secrets in visual cryptography,
PR(40), No. 12, December 2007, pp. 3633-3651.
Elsevier DOI 0709
Secret sharing; Visual cryptography; Visual multi-secret sharing BibRef

Fang, W.P.[Wen-Pinn],
Friendly progressive visual secret sharing,
PR(41), No. 4, April 2008, pp. 1410-1414.
Elsevier DOI 0801
Visual cryptography; Progress; Secret sharing; Friendly BibRef

Li, S., Li, C., Lo, K.T., Chen, G.,
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion,
CirSysVideo(18), No. 3, March 2008, pp. 338-349.
IEEE DOI 0804
BibRef

Tong, X.J.[Xiao-Jun], Cui, M.G.[Ming-Gen],
Image encryption with compound chaotic sequence cipher shifting dynamically,
IVC(26), No. 6, 1 June 2008, pp. 843-850.
Elsevier DOI 0804
Compound chaos; Stream cipher; Image encryption BibRef

Lin, Q.H.[Qiu-Hua], Yin, F.L.[Fu-Liang], Mei, T.M.[Tie-Min], Liang, H.L.[Hua-Lou],
A blind source separation-based method for multiple images encryption,
IVC(26), No. 6, 1 June 2008, pp. 788-798.
Elsevier DOI 0804
Blind source separation; Independent component analysis; Image encryption BibRef

Yang, C.N.[Ching-Nung], Chen, T.S.[Tse-Shih],
Colored visual cryptography scheme based on additive color mixing,
PR(41), No. 10, October 2008, pp. 3114-3129.
Elsevier DOI 0808
Visual cryptography; Visual secret sharing; Colored visual cryptography; Additive color mixing BibRef

Naughton, T.J.[Thomas J.], Hennelly, B.M.[Bryan M.], Dowling, T.[Tom],
Introducing secure modes of operation for optical encryption,
JOSA-A(25), No. 10, October 2008, pp. 2608-2617.
WWW Link. 0810
BibRef

Leung, B.W.[Bert W.], Ng, F.Y.[Felix Y.], Wong, D.S.[Duncan S.],
On the security of a visual cryptography scheme for color images,
PR(42), No. 5, May 2009, pp. 929-940.
Elsevier DOI 0902
Visual cryptography; Dithering technology; Color decomposition; Secret sharing; Cryptanalysis BibRef

Li, C.Q.[Cheng-Qing], Li, S.J.[Shu-Jun], Asim, M.[Muhammad], Nunez, J.[Juana], Alvarez, G.[Gonzalo], Chen, G.R.[Guan-Rong],
On the security defects of an image encryption scheme,
IVC(27), No. 9, 3 August 2009, pp. 1371-1381.
Elsevier DOI 0906
Cryptanalysis; Image encryption; Chaos; Known-plaintext attack; Chosen-plaintext attack BibRef

Li, C.Q.[Cheng-Qing], Li, S.J.[Shu-Jun], Chen, G.R.[Guan-Rong], Halang, W.A.[Wolfgang A.],
Cryptanalysis of an image encryption scheme based on a compound chaotic sequence,
IVC(27), No. 8, 2 July 2009, pp. 1035-1039.
Elsevier DOI 0906
Cryptanalysis; Image encryption; Chaos; Differential chosen-plaintext attack; Randomness test BibRef

Wang, D.S.[Dao-Shun], Yi, F.[Feng], Li, X.B.[Xiao-Bo],
On general construction for extended visual cryptography schemes,
PR(42), No. 11, November 2009, pp. 3071-3082.
Elsevier DOI 0907
Visual cryptography; Secret sharing scheme; Multi-secret images BibRef

Ye, G.D.[Guo-Dong],
Image scrambling encryption algorithm of pixel bit based on chaos map,
PRL(31), No. 5, 1 April 2010, pp. 347-354.
Elsevier DOI 1002
Image scrambling encryption; Chaos map; Gray scrambling; Position permutation; Pixel bit BibRef

Liu, W., Zeng, W., Dong, L., Yao, Q.,
Efficient Compression of Encrypted Grayscale Images,
IP(19), No. 4, April 2010, pp. 1097-1102.
IEEE DOI 1003
BibRef

Kang, I., Arce, G.R., Lee, H.K.,
Color Extended Visual Cryptography Using Error Diffusion,
IP(20), No. 1, January 2011, pp. 132-145.
IEEE DOI 1101
BibRef

Hou, Y.C., Quan, Z.Y.,
Progressive Visual Cryptography With Unexpanded Shares,
CirSysVideo(21), No. 11, November 2011, pp. 1760-1764.
IEEE DOI 1111
BibRef

Wang, R.Z.[Ran-Zan], Hsu, S.F.[Shuo-Fang],
Tagged Visual Cryptography,
SPLetters(18), No. 11, November 2011, pp. 627-630.
IEEE DOI 1112
BibRef

Liu, F.[Feng], Guo, T.[Teng], Wu, C.K.[Chuan-Kun], Qian, L.[Lina],
Improving the visual quality of size invariant visual cryptography scheme,
JVCIR(23), No. 2, February 2012, pp. 331-342.
Elsevier DOI 1201
Visual cryptography; Visual quality; Size invariant; Secret sharing; Thin line problem; Variance; Multi-pixel encryption; Probabilistic visual cryptography scheme BibRef

François, M., Grosges, T., Barchiesi, D., Erra, R.,
A new image encryption scheme based on a chaotic function,
SP:IC(27), No. 3, March 2012, pp. 249-259.
Elsevier DOI 1203
Image encryption; Chaotic function; Statistical analysis; Confusion; Diffusion; Indistinguishability BibRef

Imaizumi, S.[Shoko], Kiya, H.[Hitoshi],
A Block-Permutation-Based Encryption Scheme with Independent Processing of RGB Components,
IEICE(E101-D), No. 12, December 2018, pp. 3150-3157.
WWW Link. 1812
BibRef

Imaizumi, S.[Shoko], Ogasawara, T.[Takeshi], Kiya, H.[Hitoshi],
Block-Permutation-Based Encryption Scheme with Enhanced Color Scrambling,
SCIA17(I: 562-573).
Springer DOI 1706
BibRef

Shyu, S.J., Jiang, H.W.,
Efficient Construction for Region Incrementing Visual Cryptography,
CirSysVideo(22), No. 5, May 2012, pp. 769-777.
IEEE DOI 1202
BibRef

Yang, C.N., Shih, H.W., Wu, C.C., Harn, L.,
k Out of n Region Incrementing Scheme in Visual Cryptography,
CirSysVideo(22), No. 5, May 2012, pp. 799-810.
IEEE DOI 1202
BibRef

Yang, C.N.[Ching-Nung], Wu, C.C.[Chih-Cheng], Lin, Y.C.[Yi-Chin],
k Out of n Region-Based Progressive Visual Cryptography,
CirSysVideo(29), No. 1, January 2019, pp. 252-262.
IEEE DOI 1901
BibRef
Earlier: A1, A3, A2:
Cheating Immune Block-Based Progressive Visual Cryptography,
IWDW13(95-108).
Springer DOI 1407
Visualization, Cryptography, Image color analysis, Image reconstruction, Stacking, Decoding, Visual secret sharing, progressive decoding BibRef

Win, L.L., Thomas, T., Emmanuel, S.,
Privacy Enabled Digital Rights Management Without Trusted Third Party Assumption,
MultMed(14), No. 3, 2012, pp. 546-554.
IEEE DOI 1202
BibRef

Chen, Y.C., Horng, G., Tsai, D.S.,
Comment on 'Cheating Prevention in Visual Cryptography',
IP(21), No. 7, July 2012, pp. 3319-3323.
IEEE DOI 1206

See also Cheating Prevention in Visual Cryptography. BibRef

Dalhoum, A.L.A.[Abdel Latif Abu], Mahafzah, B.A.[Basel A.], Awwad, A.A.[Aiman Ayyal], Aldhamari, I.[Ibraheem], Ortega, A.[Alfonso], Alfonseca, M.[Manuel],
Digital Image Scrambling Using 2D Cellular Automata,
MultMedMag(19), No. 4, 2012, pp. 28-36.
IEEE DOI 1210
based on game of life. BibRef

Lin, H.C.[Hsiao-Ching], Yang, C.N.[Ching-Nung], Laih, C.S.[Chi-Sung], Lin, H.T.[Hui-Tang],
Natural language letter based visual cryptography scheme,
JVCIR(24), No. 3, April 2013, pp. 318-331.
Elsevier DOI 1303
Deterministic VCS; Letter-based; Natural language; Probabilistic VCS; Secret sharing; Subpixel; Visual cryptography scheme; Visual secret sharing BibRef

Zhang, Y.S.[Yu-Shu], Xiao, D.[Di], Shu, Y.[Yonglu], Li, J.[Jing],
A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differential equations,
SP:IC(28), No. 3, March 2013, pp. 292-300.
Elsevier DOI 1303
Hyperbolic chaotic systems; Partial differential equations; Image encryption; Coupled map lattices; Time-varying delay BibRef

Zhu, H.[Hegui], Zhao, C.[Cheng], Zhang, X.D.[Xiang-De],
A novel image encryption-compression scheme using hyper-chaos and Chinese remainder theorem,
SP:IC(28), No. 6, July 2013, pp. 670-680.
Elsevier DOI 1306
Hyper-chaos; Image encryption; Image compression; Compression ratio; Chinese remainder theorem BibRef

Azzaz, M.S., Tanougast, C., Sadoudi, S., Dandache, A.,
Robust chaotic key stream generator for real-time images encryption,
RealTimeIP(8), No. 3, September 2013, pp. 297-306.
WWW Link. 1309
BibRef

Lima, J.B., Lima, E.A.O., Madeiro, F.,
Image encryption based on the finite field cosine transform,
SP:IC(28), No. 10, 2013, pp. 1537-1547.
Elsevier DOI 1312
Image encryption BibRef

Lima, J.B., da Silva, E.S., Campello de Souza, R.M.,
Cosine transforms over fields of characteristic 2: Fast computation and application to image encryption,
SP:IC(54), No. 1, 2017, pp. 130-139.
Elsevier DOI 1704
Finite field cosine transform BibRef

Lima, J.B., Madeiro, F., Sales, F.J.R.,
Encryption of medical images based on the cosine number transform,
SP:IC(35), No. 1, 2015, pp. 1-8.
Elsevier DOI 1506
Medical images BibRef

Liu, Y.[Yang], Tong, X.J.[Xiao-Jun], Hu, S.[Shicheng],
A family of new complex number chaotic maps based image encryption algorithm,
SP:IC(28), No. 10, 2013, pp. 1548-1559.
Elsevier DOI 1312
Image encryption BibRef

Li, P.[Peng], Yang, C.N.[Ching-Nung], Kong, Q.[Qian], Ma, Y.P.[Yan-Peng], Liu, Z.[Zheng],
Sharing more information in gray visual cryptography scheme,
JVCIR(24), No. 8, 2013, pp. 1380-1393.
Elsevier DOI 1312
Visual cryptography BibRef

Yang, C.N.[Ching-Nung], Wang, D.S.[Dao-Shun],
Property Analysis of XOR-Based Visual Cryptography,
CirSysVideo(24), No. 2, February 2014, pp. 189-197.
IEEE DOI 1403
cryptography BibRef

Barakat, M.L., Mansingka, A.S., Radwan, A.G., Salama, K.N.,
Hardware stream cipher with controllable chaos generator for colour image encryption,
IET-IPR(8), No. 1, January 2014, pp. 33-43.
DOI Link 1403
cryptography BibRef

Pande, A., Mohapatra, P., Zambreno, J.,
Securing Multimedia Content Using Joint Compression and Encryption,
MultMedMag(20), No. 4, October 2013, pp. 50-61.
IEEE DOI 1403
Internet BibRef

Caragata, D.[Daniel], Tutanescu, I.[Ion],
On the security of a new image encryption scheme based on a chaotic function,
SIViP(8), No. 4, May 2014, pp. 641-646.
WWW Link. 1404
BibRef

Wang, X., Pei, Q., Li, H.,
A Lossless Tagged Visual Cryptography Scheme,
SPLetters(21), No. 7, July 2014, pp. 853-856.
IEEE DOI 1405
Cryptography BibRef

Ghebleh, M., Kanso, A., Noura, H.,
An image encryption scheme based on irregularly decimated chaotic maps,
SP:IC(29), No. 5, 2014, pp. 618-627.
Elsevier DOI 1406
Chaos BibRef

Dong, C.[Chang'e],
Color image encryption using one-time keys and coupled chaotic systems,
SP:IC(29), No. 5, 2014, pp. 628-640.
Elsevier DOI 1406
Color image encryption BibRef

Czaplewski, B.[Bartosz], Dzwonkowski, M.[Mariusz], Rykaczewski, R.[Roman],
Digital fingerprinting for color images based on the quaternion encryption scheme,
PRL(46), No. 1, 2014, pp. 11-19.
Elsevier DOI 1407
Cryptography BibRef

Czaplewski, B.[Bartosz],
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining,
JVCIR(40, Part A), No. 1, 2016, pp. 1-13.
Elsevier DOI 1609
Fingerprinting BibRef

Zhang, X.P.[Xuan-Ping], Zhao, Z.M.[Zhong-Meng], Wang, J.Y.[Jia-Yin],
Chaotic image encryption based on circular substitution box and key stream buffer,
SP:IC(29), No. 8, 2014, pp. 902-913.
Elsevier DOI 1410
Image encryption BibRef

Boriga, R.[Radu], Dascalescu, A.C.[Ana Cristina], Priescu, I.[Iustin],
A new hyperchaotic map and its application in an image encryption scheme,
SP:IC(29), No. 8, 2014, pp. 887-901.
Elsevier DOI 1410
Hyperchaos BibRef

Li, C.Q.[Cheng-Qing], Liu, Y.S.[Yuan-Sheng], Zhang, L.Y.[Leo Yu], Wong, K.W.[Kwok-Wo],
Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem,
SP:IC(29), No. 8, 2014, pp. 914-920.
Elsevier DOI 1410
Compression BibRef

Bhatnagar, G., Wu, Q.M.J.,
Biometric Inspired Multimedia Encryption Based on Dual Parameter Fractional Fourier Transform,
SMCS(44), No. 9, September 2014, pp. 1234-1247.
IEEE DOI 1410
Fourier transforms BibRef

Ziyabar, H.M.[Hashem Moradmand], Sinaie, M.[Mahnaz], Payandeh, A.[Ali], Payandeh, A.[Ali], Vakili, V.T.[Vahid Tabataba],
Secure FSM-based arithmetic codes,
SIViP(8), No. 7, October 2014, pp. 1263-1272.
Springer DOI 1410
atithmetic coding for compression and secrecy. BibRef

Masmoudi, A., Puech, W.,
Lossless chaos-based crypto-compression scheme for image protection,
IET-IPR(8), No. 12, 2014, pp. 671-686.
DOI Link 1412
chaos BibRef

Abd-El-Hafiz, S.K., Radwan, A.G., Haleem, S.H.A.[S.H. Abdel], Barakat, M.L.,
A fractal-based image encryption system,
IET-IPR(8), No. 12, 2014, pp. 742-752.
DOI Link 1412
cryptography BibRef

Bai, X.[Xiao], Yang, H.[Haichuan], Zhou, J.[Jun], Ren, P.[Peng], Cheng, J.[Jian],
Data-Dependent Hashing Based on p-Stable Distribution,
IP(23), No. 12, December 2014, pp. 5033-5046.
IEEE DOI 1412
cryptography BibRef

Elhoseny, H.M.[Heba M.], Ahmed, H.E.H.[Hossam E. H.], Abbas, A.M.[Alaa M.], Kazemian, H.B.[Hassan B.], Faragallah, O.S.[Osama S.], El-Rabaie, E.S.M.[El-Sayed M.], El-Samie, F.E.A.[Fathi E. Abd],
Chaotic encryption of images in the fractional Fourier transform domain using different modes of operation,
SIViP(9), No. 3, March 2015, pp. 611-622.
Springer DOI 1503
BibRef

Faragallah, O.S.[Osama S.],
Efficient confusion-diffusion chaotic image cryptosystem using enhanced standard map,
SIViP(9), No. 8, November 2015, pp. 1917-1926.
WWW Link. 1511
BibRef

Ullagaddi, V.[Vishwanath], Hassan, F.[Firas], Devabhaktuni, V.[Vijay],
Symmetric synchronous stream encryption using images,
SIViP(9), No. 1, January 2015, pp. 1-8.
Springer DOI 1503
Use bit plane from an image for encryption of stream. (Not encrypt an image.) BibRef

Sun, Y.Y.[Yuan-Yuan], Xu, R.[Rudan], Chen, L.[Lina], Hu, X.P.[Xiao-Peng],
Image compression and encryption scheme using fractal dictionary and Julia set,
IET-IPR(9), No. 3, 2015, pp. 173-183.
DOI Link 1504
cryptography BibRef

Jeng, F.G.[Fuh-Gwo], Huang, W.L.[Wei-Lun], Chen, T.H.[Tzung-Her],
Cryptanalysis and improvement of two hyper-chaos-based image encryption schemes,
SP:IC(34), No. 1, 2015, pp. 45-51.
Elsevier DOI 1505
Cryptanalysis BibRef

Wadi, S.M., Zainal, N.,
Decomposition by binary codes-based speedy image encryption algorithm for multiple applications,
IET-IPR(9), No. 5, 2015, pp. 413-423.
DOI Link 1506
binary codes BibRef

Nini, B., Lemmouchi, C.,
Security analysis of a three-dimensional rotation-based image encryption,
IET-IPR(9), No. 8, 2015, pp. 680-689.
DOI Link 1506
cryptography BibRef

Shyu, S.J., Chen, M.C.,
Minimizing Pixel Expansion in Visual Cryptographic Scheme for General Access Structures,
CirSysVideo(25), No. 9, September 2015, pp. 1557-1561.
IEEE DOI 1509
Cryptography BibRef

Daneshgar, A.[Amir], Khadem, B.[Behrooz],
A self-synchronized chaotic image encryption scheme,
SP:IC(36), No. 1, 2015, pp. 106-114.
Elsevier DOI 1509
Chaos BibRef

Dzwonkowski, M., Papaj, M., Rykaczewski, R.,
A New Quaternion-Based Encryption Method for DICOM Images,
IP(24), No. 11, November 2015, pp. 4614-4622.
IEEE DOI 1509
DICOM BibRef

Yang, C.N.[Ching-Nung], Wu, C.C.[Chih-Cheng], Lin, Y.C.[Yi-Chin], Kim, C.[Cheonshik],
Constructions and Properties of General (k, n) Block-Based Progressive Visual Cryptography,
ETRI(37), No. 5, October 2015, pp. 979-989.
DOI Link 1511
BibRef

Tong, X.J.[Xiao-Jun], Zhang, M.[Miao], Wang, Z.[Zhu], Liu, Y.[Yang], Xu, H.[Hui], Ma, J.[Jing],
A fast encryption algorithm of color image based on four-dimensional chaotic system,
JVCIR(33), No. 1, 2015, pp. 219-234.
Elsevier DOI 1512
Image encryption BibRef

Bechikh, R.[Rabei], Hermassi, H.[Houcemeddine], El-Latif, A.A.A.[Ahmed A. Abd], Rhouma, R.[Rhouma], Belghith, S.[Safya],
Breaking an image encryption scheme based on a spatiotemporal chaotic system,
SP:IC(39, Part A), No. 1, 2015, pp. 151-158.
Elsevier DOI 1512
Cryptanalysis BibRef

Zhang, Y.S.[Yu-Shu], Wong, K.W.[Kwok-Wo], Zhang, L.Y.[Leo Yu], Wen, W.Y.[Wen-Ying], Zhou, J.T.[Jian-Tao], He, X.[Xing],
Robust coding of encrypted images via structural matrix,
SP:IC(39, Part A), No. 1, 2015, pp. 202-211.
Elsevier DOI 1512
Multiple description code BibRef

Islam, N.[Naveed], Shahid, Z.[Zafar], Puech, W.[William],
Denoising and error correction in noisy AES-encrypted images using statistical measures,
SP:IC(41), No. 1, 2016, pp. 15-27.
Elsevier DOI 1602
BibRef
And: A1, A3, Only:
Decryption of noisy encrypted images by statistical analysis,
EUVIP11(192-198).
IEEE DOI 1110
Cryptosystem. BibRef

El Assad, S.[Safwan], Farajallah, M.[Mousa],
A new chaos-based image encryption system,
SP:IC(41), No. 1, 2016, pp. 144-157.
Elsevier DOI 1602
Chaos-based cryptosystem BibRef

Fawaz, Z.[Zeinab], Noura, H.[Hassan], Mostefaoui, A.[Ahmed],
An efficient and secure cipher scheme for images confidentiality preservation,
SP:IC(42), No. 1, 2016, pp. 90-108.
Elsevier DOI 1603
Security BibRef

Ye, G., Huang, X.,
An Image Encryption Algorithm Based on Autoblocking and Electrocardiography,
MultMedMag(23), No. 2, April 2016, pp. 64-71.
IEEE DOI 1605
Algorithm design and analysis BibRef

Chen, C.C.[Chien-Chang], Chen, S.C.[Shih-Chang],
Two-layered structure for optimally essential secret image sharing scheme,
JVCIR(38), No. 1, 2016, pp. 595-601.
Elsevier DOI 1605
Secret image sharing BibRef

Chen, C.C.[Chien-Chang],
Essential secret image sharing scheme with equal-sized shadows generation,
JVCIR(52), 2018, pp. 143 - 150.
Elsevier DOI 1804
Secret image sharing, Essential, Non-essential, Three-layered structure BibRef

Yang, C.N.[Ching-Nung], Sun, L.Z.[Li-Zhe], Yan, X.[Xuehu], Kim, C.[Cheonshik],
Design a new visual cryptography for human-verifiable authentication in accessing a database,
RealTimeIP(12), No. 2, August 2016, pp. 483-494.
Springer DOI 1608
BibRef

Karabina, K.[Koray], Canpolat, O.[Onur],
A new cryptographic primitive for noise tolerant template security,
PRL(80), No. 1, 2016, pp. 70-75.
Elsevier DOI 1609
Template security BibRef

Yap, W.S.[Wun-She], Phan, R.C.W.[Raphael C.W.], Goi, B.M.[Bok-Min], Yau, W.C.[Wei-Chuen], Heng, S.H.[Swee-Huay],
On the effective subkey space of some image encryption algorithms using external key,
JVCIR(40, Part A), No. 1, 2016, pp. 51-57.
Elsevier DOI 1609
Image encryption BibRef

Murugan, B., Gounder, A.G.N.[A. G. Nanjappa],
Image encryption scheme based on block-based confusion and multiple levels of diffusion,
IET-CV(10), No. 6, 2016, pp. 593-602.
DOI Link 1609
cryptography BibRef

Abanda, Y., Tiedeu, A.,
Image encryption by chaos mixing,
IET-IPR(10), No. 10, 2016, pp. 742-750.
DOI Link 1610
chaos BibRef

Shao, Z.H.[Zhu-Hong], Shang, Y.Y.[Yuan-Yuan], Zeng, R.[Rui], Shu, H.Z.[Hua-Zhong], Coatrieux, G.[Gouenou], Wu, J.S.[Jia-Song],
Robust watermarking scheme for color image based on quaternion-type moment invariants and visual cryptography,
SP:IC(48), No. 1, 2016, pp. 12-21.
Elsevier DOI 1609
Color image BibRef

Wang, Y.F.[Yun-Fei], Shang, Y.Y.[Yuan-Yuan], Shao, Z.H.[Zhu-Hong], Zhang, Y.[Yan], Coatrieux, G.[Gouenou], Ding, H.[Hui], Liu, T.[Tie],
Multiple color image encryption based on cascaded quaternion gyrator transforms,
SP:IC(107), 2022, pp. 116793.
Elsevier DOI 2208
Multiple color image encryption, Cascaded encryption structure, Quaternion gyrator transform BibRef

Shao, Z.H.[Zhu-Hong], Wu, J.S.[Jia-Song], Coatrieux, J.L.[Jean Louis], Coatrieux, G.[Gouenou], Shu, H.Z.[Hua-Zhong],
Quaternion gyrator transform and its application to color image encryption,
ICIP13(4579-4582)
IEEE DOI 1402
Quaternion gyrator transform; color image; encryption BibRef

Annaby, M.H., Rushdi, M.A., Nehary, E.A.,
Image encryption via discrete fractional Fourier-type transforms generated by random matrices,
SP:IC(49), No. 1, 2016, pp. 25-46.
Elsevier DOI 1609
Discrete fractional Fourier transform BibRef

Yuan, H.M.[Hong-Mei], Liu, Y.[Ye], Lin, T.[Tao], Hu, T.[Ting], Gong, L.H.[Li-Hua],
A new parallel image cryptosystem based on 5D hyper-chaotic system,
SP:IC(52), No. 1, 2017, pp. 87-96.
Elsevier DOI 1701
Parallel image cryptosystem BibRef

Chai, X.L.[Xiu-Li], Gan, Z.H.[Zhi-Hua], Yang, K.[Kang], Chen, Y.R.[Yi-Ran], Liu, X.X.[Xian-Xing],
An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations,
SP:IC(52), No. 1, 2017, pp. 6-19.
Elsevier DOI 1701
Image encryption BibRef

Yang, C.N.[Ching-Nung], Liao, J.K.[Jung-Kuo], Wang, D.S.[Dao-Shun],
New privilege-based visual cryptography with arbitrary privilege levels,
JVCIR(42), No. 1, 2017, pp. 121-131.
Elsevier DOI 1701
Visual cryptography BibRef

Cao, X.W.[Xing-Wu], Wei, X.X.[Xing-Xing], Guo, R.[Rui], Wang, C.C.[Chang-Chun],
No embedding: A novel image cryptosystem for meaningful encryption,
JVCIR(44), No. 1, 2017, pp. 236-249.
Elsevier DOI 1703
Image encryption BibRef

Huang, H.Q.[Hui-Qing], Yang, S.Z.[Shou-Zhi],
Colour image encryption based on logistic mapping and double random-phase encoding,
IET-IPR(11), No. 4, April 2017, pp. 211-216.
DOI Link 1704
BibRef

Özkaynak, F.[Fatih], Çelik, V.[Vedat], Özer, A.B.[Ahmet Bedri],
A new S-box construction method based on the fractional-order chaotic Chen system,
SIViP(11), No. 4, May 2017, pp. 659-664.
WWW Link. 1704
substitution box, block encryption algorithms. BibRef

Liu, H.J.[Hong-Jun], Kadir, A.[Abdurahman], Sun, X.B.[Xiao-Bo],
Chaos-based fast colour image encryption scheme with true random number keys from environmental noise,
IET-IPR(11), No. 5, April 2017, pp. 324-332.
DOI Link 1706
BibRef

Herbadji, D.[Djamel], Belmeguenai, A.[Aissa], Derouiche, N.[Nadir], Liu, H.J.[Hong-Jung],
Colour image encryption scheme based on enhanced quadratic chaotic map,
IET-IPR(14), No. 1, January 2020, pp. 40-52.
DOI Link 1912
BibRef

Li, C., Lin, D., Lü, J.,
Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits,
MultMedMag(24), No. 3, 2017, pp. 64-71.
IEEE DOI 1708
Algorithm design and analysis, Ciphers, Cryptography, Encryption, Image processing, Mathematical model, Multimedia communication, Visualization, ciphertext-only attack, cryptanalysis, cryptography, graphics, image encryption, known-plaintext attack, multimedia, security, template, matching BibRef

Yang, C.N.[Ching-Nung], Wu, X.T.[Xiao-Tian], Chou, Y.C.[Yung-Chien], Fu, Z.J.[Zhang-Jie],
Constructions of general reversible AMBTC-based visual cryptography with two decryption options,
JVCIR(48), No. 1, 2017, pp. 182-194.
Elsevier DOI 1708
Visual, cryptography BibRef

Bao, L., Yi, S., Zhou, Y.,
Combination of Sharing Matrix and Image Encryption for Lossless (k,n)-Secret Image Sharing,
IP(26), No. 12, December 2017, pp. 5618-5631.
IEEE DOI 1710
cryptography, image reconstruction, sharing matrix, Algorithm design and analysis, Distortion, BibRef

Nosrati, K.[Komeil], Volos, C.[Christos], Azemi, A.[Asad],
Cubature Kalman filter-based chaotic synchronization and image encryption,
SP:IC(58), No. 1, 2017, pp. 35-48.
Elsevier DOI 1710
Chaos, synchronization BibRef

Boussif, M.[Mohamed], Aloui, N.[Noureddine], Cherif, A.[Adnane],
Smartphone application for medical images secured exchange based on encryption using the matrix product and the exclusive addition,
IET-IPR(11), No. 11, November 2017, pp. 1020-1026.
DOI Link 1711
BibRef

Askar, S.S.[Sameh S.], Karawia, A.A.[Abdelrahman A.], Alammar, F.S.[Fatmah S.],
Cryptographic algorithm based on pixel shuffling and dynamical chaotic economic map,
IET-IPR(12), No. 1, January 2018, pp. 158-167.
DOI Link 1712
BibRef
And: Erratum: IET-IPR(12), No. 1, January 2018, pp. 168-168.
DOI Link 1712
BibRef

Cho, W., Yu, N.Y.,
Secure Communications With Asymptotically Gaussian Compressed Encryption,
SPLetters(25), No. 1, January 2018, pp. 80-84.
IEEE DOI 1801
Gaussian processes, cryptography, telecommunication security, wireless channels, Hellinger distance, TV distance, total variation (TV) distance BibRef

Li, M.[Ming], Guo, Y.Z.[Yu-Zhu], Huang, J.[Jie], Li, Y.[Yang],
Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure,
SP:IC(62), 2018, pp. 164-172.
Elsevier DOI 1802
Cryptanalysis, Permutation-diffusion structure, Image encryption, Chaos, Chosen plaintext attack BibRef

Wang, C.T.[Chun-Tao], Xiao, D.Q.[De-Qing], Peng, H.X.[Hong-Xing], Zhang, R.Y.[Rong-Yue],
A lossy compression scheme for encrypted images exploiting Cauchy distribution and weighted rate distortion optimization,
JVCIR(51), 2018, pp. 122-130.
Elsevier DOI 1802
Compression of encrypted signals, Statistical model, Rate-distortion optimization, Lifting wavelet BibRef

Jia, X., Wang, D., Nie, D., Zhang, C.,
Collaborative Visual Cryptography Schemes,
CirSysVideo(28), No. 5, May 2018, pp. 1056-1070.
IEEE DOI 1805
Collaboration, Cryptography, Image reconstruction, Information security, Integer linear programming, Visualization, visual cryptography (VC) scheme BibRef

Kaur, M.[Manjit], Kumar, V.[Vijay],
Colour image encryption technique using differential evolution in non-subsampled contourlet transform domain,
IET-IPR(12), No. 7, July 2018, pp. 1273-1283.
DOI Link 1806
BibRef

Reddy, M.P.[M. Purushotham], Reddy, B.V.R.[B. Venkata Ramana], Bindu, C.S.[C. Shoba],
An image encryption algorithm using logarithmic function and Henon-chaotic function,
IJCVR(8), No. 4, 2018, pp. 388-402.
DOI Link 1808
BibRef

Yang, C.N.[Ching-Nung], Wu, F.H.[Fu-Heng], Peng, S.L.[Sheng-Lung],
Enhancing multi-factor cheating prevention in visual cryptography based minimum (k, n)-connected graph,
JVCIR(55), 2018, pp. 660-676.
Elsevier DOI 1809
Visual cryptography, Cheating attack, Cheating prevention, Verification image, Shadow image BibRef

Montesinos-García, J.J.[Juan J.], Martinez-Guerra, R.[Rafael],
Colour image encryption via fractional chaotic state estimation,
IET-IPR(12), No. 10, October 2018, pp. 1913-1920.
DOI Link 1809
BibRef

Dzwonkowski, M., Rykaczewski, R.,
Secure Quaternion Feistel Cipher for DICOM Images,
IP(28), No. 1, January 2019, pp. 371-380.
IEEE DOI 1810
Quaternions, Encryption, DICOM, Ciphers, Cryptography, medical data, quaternion rotation, lossless scheme, Julia sets BibRef

Singh, H.[Hukum],
Watermarking image encryption using deterministic phase mask and singular value decomposition in fractional Mellin transform domain,
IET-IPR(12), No. 11, November 2018, pp. 1994-2001.
DOI Link 1810
BibRef

Yan, B., Xiang, Y., Hua, G.,
Improving the Visual Quality of Size-Invariant Visual Cryptography for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach,
IP(28), No. 2, February 2019, pp. 896-911.
IEEE DOI 1811
Gray-scale, Visualization, Cryptography, Stacking, Image reconstruction, Measurement, vector visual cryptography BibRef

Lobachev, O.[Oleg],
Direct visualization of cryptographic keys for enhanced security,
VC(34), No. 12, December 2018, pp. 1749-1759.
WWW Link. 1811
BibRef

Sharma, H.[Himani], Mishra, D.C., Sharma, R.K., Kumar, N.[Naveen],
Crypto-stego System for Securing Text and Image Data,
IJIG(18), No. 4 2018, pp. 1850020.
DOI Link 1812
BibRef

Li, R.Z.[Ren-Zhi], Liu, Q.[Qian], Liu, L.F.[Ling-Feng],
Novel image encryption algorithm based on improved logistic map,
IET-IPR(13), No. 1, January 2019, pp. 125-134.
DOI Link 1812
BibRef

Chen, B.J.[Bei-Jing], Yu, M.[Ming], Tian, Y.H.[Yu-Hang], Li, L.[Leida], Wang, D.C.[Ding-Cheng], Sun, X.M.[Xing-Ming],
Multiple-parameter fractional quaternion Fourier transform and its application in colour image encryption,
IET-IPR(12), No. 12, December 2018, pp. 2238-2249.
DOI Link 1812
BibRef

Su, Y.R.[Ying-Ri], Wo, Y.[Yan], Han, G.Q.[Guo-Qiang],
Reversible cellular automata image encryption for similarity search,
SP:IC(72), 2019, pp. 134-147.
Elsevier DOI 1902
Image encryption, Image similarity search, Multi-granularity, Reversible cellular automata BibRef

Wu, X.T.[Xiao-Tian], Chen, D.[Dong], Yang, C.N.[Ching-Nung], Yang, Y.Y.[Yi-Yun],
A (k,n) threshold partial reversible AMBTC-based visual cryptography using one reference image,
JVCIR(59), 2019, pp. 550-562.
Elsevier DOI 1903
Visual cryptography, Block truncation coding, Partial reversible, Meaningful share, Contrast, Reference image BibRef

Gondim, M.A.A.[Marcos A.A.], de Oliveira Neto, J.R.[José R.], Lima, J.B.[Juliano B.],
Steerable Fourier number transform with application to image encryption,
SP:IC(74), 2019, pp. 89-95.
Elsevier DOI 1904
Number-theoretic transforms, Steerable transforms, Graph signal processing, Image encryption BibRef

de Oliveira Neto, J.R.[José R.], Lima, J.B.[Juliano B.], Panario, D.,
The Design of a Novel Multiple-Parameter Fractional Number-Theoretic Transform and Its Application to Image Encryption,
CirSysVideo(30), No. 8, August 2020, pp. 2489-2502.
IEEE DOI 2008
Encryption, Eigenvalues and eigenfunctions, Cats, Discrete Fourier transforms, Systematics, image encryption BibRef

Cao, H., Lin, S., Zhang, W., Han, Y.S.,
On the Security of Secret Sharing Over a Ring and the Fast Implementation,
SPLetters(26), No. 5, May 2019, pp. 705-709.
IEEE DOI 1905
computational complexity, cryptography, fast Fourier transforms, polynomials, polynomial secret sharing, secret sharing scheme, fast fourier transform BibRef

Li, F.Y.[Feng-Yong], Wu, H.B.[Hai-Bin], Zhou, G.[Gang], Wei, W.M.[Wei-Min],
Robust real-time image encryption with aperiodic chaotic map and random-cycling bit shift,
RealTimeIP(16), No. 3, June 2019, pp. 775-790.
WWW Link. 1906
BibRef

Kang, X., Ming, A., Tao, R.,
Reality-Preserving Multiple Parameter Discrete Fractional Angular Transform and Its Application to Color Image Encryption,
CirSysVideo(29), No. 6, June 2019, pp. 1595-1607.
IEEE DOI 1906
Transforms, Encryption, Color, Image color analysis, Indexes, Chaotic communication, Fractional angular transform, reality preserving BibRef

Guan, M.M.[Meng-Meng], Yang, X.L.[Xue-Lin], Hu, W.S.[Wei-Sheng],
Chaotic image encryption algorithm using frequency-domain DNA encoding,
IET-IPR(13), No. 9, 18 July 2019, pp. 1535-1539.
DOI Link 1907
BibRef

Kang, X., Tao, R.,
Color Image Encryption Using Pixel Scrambling Operator and Reality-Preserving MPFRHT,
CirSysVideo(29), No. 7, July 2019, pp. 1919-1932.
IEEE DOI 1907
Transforms, Encryption, Color, Image color analysis, Indexes, Color image encryption, Hartley transform, chaos scrambling BibRef

Li, G.D.[Guo-Dong], Wang, L.L.[Le-Le],
Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform,
VC(35), No. 9, September 2018, pp. 1267-1277.
WWW Link. 1908
BibRef

Abdmouleh, M.K.[Med Karim], Khalfallah, A.[Ali], Bouhlel, M.S.[Med Salim],
Crypto-compression scheme based on the DWT for medical image security,
IJCVR(9), No. 4, 2019, pp. 340-350.
DOI Link 1908
BibRef

Melgar, M.E.V.[Max E. Vizcarra], Farias, M.C.Q.[Mylène C.Q.],
A (2,2) XOR-based visual cryptography scheme without pixel expansion,
JVCIR(63), 2019, pp. 102592.
Elsevier DOI 1909
Visual cryptography, Visual secret sharing, Color interference BibRef

Noura, H.N.[Hassan N.], Chehab, A.[Ali], Couturier, R.[Raphaël],
Efficient and secure cipher scheme with dynamic key-dependent mode of operation,
SP:IC(78), 2019, pp. 448-464.
Elsevier DOI 1909
Lightweight flexible key-dependent cipher scheme, Dynamic operation mode, Security and performance analysis BibRef

Artiles, J.A.P.[José A.P.], Chaves, D.P.B.[Daniel P.B.], Pimentel, C.[Cecilio],
Image encryption using block cipher and chaotic sequences,
SP:IC(79), 2019, pp. 24-31.
Elsevier DOI 1911
Advanced encryption standard, Block cipher, Chaotic maps, Image encryption, Security BibRef

Karawia, A.[Abdelrahman],
Image encryption based on Fisher-Yates shuffling and three dimensional chaotic economic map,
IET-IPR(13), No. 12, October 2019, pp. 2086-2097.
DOI Link 1911
BibRef

Yu, C.Z.[Chang-Zhi], Li, H.J.[Heng-Jian], Wang, X.[Xiyu],
SVD-based image compression, encryption, and identity authentication algorithm on cloud,
IET-IPR(13), No. 12, October 2019, pp. 2224-2232.
DOI Link 1911
BibRef

Zhang, Q.Y.[Qiu-Yu], Han, J.T.[Ji-Tian], Ye, Y.T.[Yu-Tong],
Image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding,
IET-IPR(13), No. 14, 12 December 2019, pp. 2905-2915.
DOI Link 1912
BibRef

Zhang, Q.Y.[Qiu-Yu], Han, J.T.[Ji-Tian], Ye, Y.T.[Yu-Tong],
Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding,
IET-IPR(15), No. 4, 2021, pp. 885-896.
DOI Link 2106
BibRef

Shao, Z.H.[Zhu-Hong], Liu, X.L.[Xi-Lin], Yao, Q.J.[Qi-Jun], Qi, N.[Na], Shang, Y.Y.[Yuan-Yuan], Zhang, J.J.[Jing-Jing],
Multiple-image encryption based on chaotic phase mask and equal modulus decomposition in quaternion gyrator domain,
SP:IC(80), 2020, pp. 115662.
Elsevier DOI 1912
Multiple-image encryption, Quaternion gyrator transform, Chaotic phase mask, Equal modulus decomposition, Component combination BibRef

Kang, X.J.[Xue-Jing], Guo, Z.H.[Zi-Hui],
A new color image encryption scheme based on DNA encoding and spatiotemporal chaotic system,
SP:IC(80), 2020, pp. 115670.
Elsevier DOI 1912
Color image encryption, DNA, Chaotic map, MLNCML system BibRef

ALI-PACHA, H.[Hana], HADJ-SAID, N.[Naima], ALI-PACHA, A.[Adda],
Data security based on homographic function,
PRL(129), 2020, pp. 240-246.
Elsevier DOI 2001
Data security, Substitution cipher, Homographic function, Chaos-based cryptography, Hénon map, Lightweight encryption algorithm BibRef

Sfar, A.R.[A. Riahi], Challal, Y., Moyal, P., Natalizio, E.,
A Game Theoretic Approach for Privacy Preserving Model in IoT-Based Transportation,
ITS(20), No. 12, December 2019, pp. 4405-4414.
IEEE DOI 2001
Privacy, Games, Sensors, Game theory, Cryptography, Vehicles, Internet of Things, intelligent transportation, privacy, Markov chains BibRef

Li, L., Wen, G., Wang, Z., Yang, Y.,
Efficient and Secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications,
MultMed(22), No. 1, January 2020, pp. 82-95.
IEEE DOI 2001
Monitoring, Internet of Things, Compressed sensing, Wireless sensor networks, Image communication, chaotic systems BibRef

Zhang, H.[Hao], Wang, X.Q.[Xiao-Qing], Wang, X.Y.[Xing-Yuan], Yan, P.F.[Peng-Fei],
Novel multiple images encryption algorithm using CML system and DNA encoding,
IET-IPR(14), No. 3, 28 February 2020, pp. 518-529.
DOI Link 2002
BibRef

Zhou, L.[Longfu], Bai, S.[Sen], Cao, Y.Q.[Yu-Qiang], Wang, Y.L.[Ying-Long],
Image Visually Meaningful Cryptography Based on Julia Set Generating and Information Hiding,
IWDW19(393-406).
Springer DOI 2003
BibRef

Jia, M.[Meng],
Image encryption with cross colour field algorithm and improved cascade chaos systems,
IET-IPR(14), No. 5, 17 April 2020, pp. 973-981.
DOI Link 2004
BibRef

Kaur, M.[Manjit], Singh, D.[Dilbag], Uppal, R.S.[Raminder Singh],
Parallel strength Pareto evolutionary algorithm-II based image encryption,
IET-IPR(14), No. 6, 11 May 2020, pp. 1015-1026.
DOI Link 2005
BibRef

Balaska, N.[Nawel], Ahmida, Z.[Zahir], Belmeguenai, A.[Aissa], Boumerdassi, S.[Selma],
Image encryption using a combination of Grain-128a algorithm and Zaslavsky chaotic map,
IET-IPR(14), No. 6, 11 May 2020, pp. 1120-1131.
DOI Link 2005
BibRef

Huang, H.Q.[Hui-Qing], Yang, S.Z.[Shou-Zhi], Ye, R.S.[Rui-Song],
Efficient symmetric image encryption by using a novel 2D chaotic system,
IET-IPR(14), No. 6, 11 May 2020, pp. 1157-1163.
DOI Link 2005
BibRef

Boussif, M.[Mohamed], Aloui, N.[Noureddine], Cherif, A.[Adnene],
Securing DICOM images by a new encryption algorithm using Arnold transform and Vigenère cipher,
IET-IPR(14), No. 6, 11 May 2020, pp. 1209-1216.
DOI Link 2005
BibRef

Sudeepa, K.B., Aithal, G.[Ganesh], Rajinikanth, V., Satapathy, S.C.[Suresh Chandra],
Genetic algorithm based key sequence generation for cipher system,
PRL(133), 2020, pp. 341-348.
Elsevier DOI 2005
Feedback shift register, Genetic algorithm, Stream cipher system, Pseudo random number generator, Mutation BibRef

Melkemi, M.[Mahmoud], Hammoudi, K.[Karim],
Voronoi-based image representation applied to binary visual cryptography,
SP:IC(87), 2020, pp. 115913.
Elsevier DOI 2007
Visual cryptography, Image communication, Visual communication, Image sharing, Voronoi diagram, Visual representation BibRef

Umoh, E.A.[Edwin A.], Iloanusi, O.N.[Ogechukwu N.], Nnolim, U.A.[Uche A.],
Image multi-encryption architecture based on hybrid keystream sequence interspersed with Haar discrete wavelet transform,
IET-IPR(14), No. 10, August 2020, pp. 2081-2091.
DOI Link 2008
BibRef

Peng, F., Zhang, X., Lin, Z., Long, M.,
A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma IPM and Coefficient Scrambling,
CirSysVideo(30), No. 8, August 2020, pp. 2765-2780.
IEEE DOI 2008
Encryption, Syntactics, Streaming media, Bit rate, Visualization, Encoding, H.265/HEVC, selective encryption, edge extraction BibRef

Zheng, J.Y.[Jie-Yu], Liu, L.F.[Ling-Feng],
Novel image encryption by combining dynamic DNA sequence encryption and the improved 2D logistic sine map,
IET-IPR(14), No. 11, September 2020, pp. 2310-2320.
DOI Link 2009
BibRef

Barik, R.C.[Ram Chandra], Changder, S.[Suvamoy],
Perceptual accessible image encryption scheme conjugating multiple chaotic maps,
IET-IPR(14), No. 11, September 2020, pp. 2457-2468.
DOI Link 2009
BibRef

Nakachi, T.[Takayuki], Kiya, H.[Hitoshi],
Secure OMP Computation Maintaining Sparse Representations and Its Application to EtC Systems,
IEICE(E103-D), No. 9, September 2020, pp. 1988-1997.
WWW Link. 2009
Encryption-then-Compression. Orthogonal Matching Pursuit. BibRef

Xiang, T., Yang, Y., Liu, H., Guo, S.,
Visual Security Evaluation of Perceptually Encrypted Images Based on Image Importance,
CirSysVideo(30), No. 11, November 2020, pp. 4129-4142.
IEEE DOI 2011
Visualization, Encryption, Feature extraction, Image resolution, Measurement, Visual security index, perceptual encryption, log-Gabor filter BibRef

Yang, Y.[Ying], Xiang, T.[Tao], Lv, X.[Xiao], Guo, S.W.[Shang-Wei], Zeng, T.Y.[Tie-Yong],
The Illusion of Visual Security: Reconstructing Perceptually Encrypted Images,
CirSysVideo(34), No. 5, May 2024, pp. 3998-4010.
IEEE DOI 2405
Encryption, Visualization, Distortion, Image restoration, Image reconstruction, Feature extraction, Threat modeling, image restoration BibRef

Sivaraman, R.[Rethinam], Rajagopalan, S.[Sundararaman], Rayappan, J.B.B.[John Bosco Balaguru], Amirtharajan, R.[Rengarajan],
Ring oscillator as confusion- diffusion agent: A complete TRNG drove image security,
IET-IPR(14), No. 13, November 2020, pp. 2987-2997.
DOI Link 2012
TRNG: true random number generators BibRef

Sun, E.Y.N.[Elaine Y.N.], Wu, H.C.[Hsiao-Chun], Busch, C.[Costas], Huang, S.C.H.[Scott C.H.], Kuan, Y.C.[Yen-Cheng], Chang, S.Y.[Shih Yu],
Efficient Recoverable Cryptographic Mosaic Technique by Permutations,
CirSysVideo(31), No. 1, January 2021, pp. 112-125.
IEEE DOI 2101
Sun, Receivers, Indexes, Encryption, Discrete cosine transforms, Recoverable cryptographic mosaic, permutation, Kullback-Leibler divergence of discrete cosine transform (DCT-KLD) BibRef

Gao, L., Qi, L., Guan, L.,
The Property of Frequency Shift in 2D-FRFT Domain With Application to Image Encryption,
SPLetters(28), 2021, pp. 185-189.
IEEE DOI 2102
Mathematical model, Encryption, Image reconstruction, Transforms, Time-frequency analysis, image encryption BibRef

Tang, Y.D.[Ya-Dong], Shao, Z.H.[Zhu-Hong], Zhao, X.X.[Xiao-Xu], Shang, Y.Y.[Yuan-Yuan],
Robust multiple color images encryption using discrete Fourier transforms and chaotic map,
SP:IC(93), 2021, pp. 116168.
Elsevier DOI 2103
Multiple image encryption, Trinion number, Discrete Fourier transform, Sharing, Random MR-SVD BibRef

Wang, X.Y.[Xing-Yuan], Su, Y.[Yining],
Image encryption based on compressed sensing and DNA encoding,
SP:IC(95), 2021, pp. 116246.
Elsevier DOI 2106
Image encryption, Compressed sensing, Four-wing chaotic system, Kronecker product, DNA coding BibRef

Wang, X.L.[Xiao-Long], Yan, H.W.[Hao-Wen], Zhang, L.M.[Li-Ming],
Vector Map Encryption Algorithm Based on Double Random Position Permutation Strategy,
IJGI(10), No. 5, 2021, pp. xx-yy.
DOI Link 2106
BibRef

Zhao, T.Y.[Tie-Yu], Yuan, L.[Lin], Chi, Y.Y.[Ying-Ying],
Image encryption using linear weighted fractional-order transform,
JVCIR(77), 2021, pp. 103098.
Elsevier DOI 2106
Fractional-order Fourier transform, Weighted fractional-order transform, Image encryption BibRef

Yan, M.[Minxiu], Xu, H.[Hui],
The multi-scroll hyper-chaotic coexistence attractors and its application,
SP:IC(95), 2021, pp. 116210.
Elsevier DOI 2106
Hyper-chaotic system, Digital image encryption, Multi-scroll attractor, Infinite coexistence attractors BibRef

Yang, C.N.[Ching-Nung], Yang, Y.Y.[Yi-Yun],
On the Analysis and Design of Visual Cryptography With Error Correcting Capability,
CirSysVideo(31), No. 6, June 2021, pp. 2465-2479.
IEEE DOI 2106
Interference, Visualization, Decoding, Stacking, Cryptography, Image reconstruction, Image color analysis, Secret sharing, error correction BibRef

Chen, J.X.[Jun-Xin], Chen, L.[Lei], Zhou, Y.C.[Yi-Cong],
Cryptanalysis of Image Ciphers With Permutation-Substitution Network and Chaos,
CirSysVideo(31), No. 6, June 2021, pp. 2494-2508.
IEEE DOI 2106
Ciphers, Encryption, Chaos, Kernel, Streaming media, Chosen-ciphertext attack, permutation substitution, bit-wise XOR, image encryption BibRef

Oravec, J.[Jakub], Ovseník, L.[Luboš], Papaj, J.[Ján],
An image encryption algorithm with a plaintext-related quantisation scheme,
IET-IPR(15), No. 9, 2021, pp. 2039-2055.
DOI Link 2106
BibRef

Yadav, S.[Shivani], Singh, H.[Hukum],
Security augmentation grounded on Fresnel and Arnold transforms using hybrid chaotic structured phase mask,
IET-IPR(15), No. 5, 2021, pp. 1042-1052.
DOI Link 2106
BibRef

Zhang, D.H.[Deng-Hui], Zhu, H.B.[Hong-Bin], Liu, S.L.[Sheng-Long], Wei, X.[Xu],
HP-VCS: A high-quality and printer-friendly visual cryptography scheme,
JVCIR(78), 2021, pp. 103186.
Elsevier DOI 2107
Visual cryptography scheme, Image security, Halftoning, Color VCS BibRef

Chen, L.P.[Li-Ping], Yin, H.[Hao], Yuan, L.G.[Li-Guo], Machado, J.A.T.[J.A. Tenreiro], Wu, R.C.[Ran-Chao], Alam, Z.[Zeeshan],
Double color image encryption based on fractional order discrete improved Henon map and Rubik's cube transform,
SP:IC(97), 2021, pp. 116363.
Elsevier DOI 2107
Fractional-order discrete systems, Henon map, DNA encryption, Double color image encryption BibRef

Chen, J.X.[Jun-Xin], Chen, L.[Lei], Zhou, Y.C.[Yi-Cong],
Universal Chosen-Ciphertext Attack for a Family of Image Encryption Schemes,
MultMed(23), 2021, pp. 2372-2385.
IEEE DOI 2108
Encryption, Nonlinear dynamical systems, Standards, Technological innovation, Matrices, Cryptanalysis, chosen-ciphertext attack BibRef

Wang, X.Y.[Xing-Yuan], Zhang, M.[Maozhen],
High-sensitivity synchronous image encryption based on improved one-dimensional compound sine map,
IET-IPR(15), No. 10, 2021, pp. 2247-2265.
DOI Link 2108
BibRef

Yang, Y.[Ying], Xiang, T.[Tao], Liu, H.C.[Hang-Cheng], Liao, X.F.[Xiao-Feng],
Convolutional Neural Network for Visual Security Evaluation,
CirSysVideo(31), No. 8, August 2021, pp. 3293-3307.
IEEE DOI 2108
Objective visual security evaluation of selectively encrypted images. Visualization, Feature extraction, Indexes, Measurement, Encryption, Visual security index, convolutional neural network, weighted pooling BibRef

Inoue, K.[Kotaro], Cho, M.[Myungjin],
Amplitude based keyless optical encryption system using deep neural network,
JVCIR(79), 2021, pp. 103251.
Elsevier DOI 2109
Optical encryption, Deep neural network, Amplitude-based double random phase encryption BibRef

Puteaux, P.[Pauline], Puech, W.[William],
CFB-Then-ECB Mode-Based Image Encryption for an Efficient Correction of Noisy Encrypted Images,
CirSysVideo(31), No. 9, September 2021, pp. 3338-3351.
IEEE DOI 2109
Cryptography, Encryption, Noise measurement, Ciphers, Noise reduction, Forward error correction, Statistical analysis, statistical analysis BibRef

Aouissaoui, I.[Ichraf], Bakir, T.[Toufik], Sakly, A.[Anis],
Robustly correlated key-medical image for DNA-chaos based encryption,
IET-IPR(15), No. 12, 2021, pp. 2770-2786.
DOI Link 2109
BibRef

Man, Z.L.[Zhen-Long], Li, J.Q.[Jin-Qing], Di, X.Q.[Xiao-Qiang],
Medical image encryption scheme based on self-verification matrix,
IET-IPR(15), No. 12, 2021, pp. 2787-2798.
DOI Link 2109
BibRef

Mishra, P.[Pooja], Bhaya, C.[Chiranjeev], Pal, A.K.[Arup Kumar], Singh, A.K.[Abhay Kumar],
A novel binary operator for designing medical and natural image cryptosystems,
SP:IC(98), 2021, pp. 116377.
Elsevier DOI 2109
Abelian group, DICOM, DNA encoding, Image cryptosystem BibRef

Ahmad, I.[Ijaz], Shin, S.[Seokjoo],
A novel hybrid image encryption-compression scheme by combining chaos theory and number theory,
SP:IC(98), 2021, pp. 116418.
Elsevier DOI 2109
Chaos theory, Image compression, Image encryption, Medical image processing, Number theory BibRef

Shahna, K.U., Mohamed, A.[Anuj],
Novel hyper chaotic color image encryption based on pixel and bit level scrambling with diffusion,
SP:IC(99), 2021, pp. 116495.
Elsevier DOI 2111
Confusion and diffusion, Image encryption, Keystream generation, Lorenz system, Security analysis BibRef

Jiang, D.H.[Dong-Hua], Liu, L.[Lidong], Wang, X.Y.[Xing-Yuan], Rong, X.W.[Xian-Wei],
Image encryption algorithm for crowd data based on a new hyperchaotic system and Bernstein polynomial,
IET-IPR(15), No. 14, 2021, pp. 3698-3717.
DOI Link 2112
BibRef

Liu, P.[Pengbo], Wang, X.Y.[Xing-Yuan], Su, Y.[Yining],
Image Encryption via Complementary Embedding Algorithm and New Spatiotemporal Chaotic System,
CirSysVideo(33), No. 5, May 2023, pp. 2506-2519.
IEEE DOI 2305
Lattices, Encryption, Airports, Cryptography, Spatiotemporal phenomena, Frequency division multiplexing, image security BibRef

Li, Y.[Yu], Zhang, L.M.[Li-Ming], Wang, X.L.[Xiao-Long], Zhang, X.G.[Xin-Gang], Zhang, Q.H.[Qi-Hang],
A Novel Invariant Based Commutative Encryption and Watermarking Algorithm for Vector Maps,
IJGI(10), No. 11, 2021, pp. xx-yy.
DOI Link 2112
BibRef

Zhang, F.F.[Fang-Fang], Zhang, X.[Xue], Cao, M.Y.[Mao-Yong], Ma, F.Y.[Feng-Ying], Li, Z.F.[Zheng-Feng],
Characteristic Analysis of 2D Lag-Complex Logistic Map and Its Application in Image Encryption,
MultMedMag(28), No. 4, October 2021, pp. 96-106.
IEEE DOI 2112
Encryption, Cryptography, Bifurcation, Logistics, Floors, Elliptic curve cryptography, Trajectory, Logistic map, chaos, safety analysis BibRef

Chen, J.X.[Jun-Xin], Zhang, L.Y.[Leo Yu], Zhou, Y.C.[Yi-Cong],
Re-Evaluation of the Security of a Family of Image Diffusion Mechanisms,
CirSysVideo(31), No. 12, December 2021, pp. 4747-4758.
IEEE DOI 2112
Cryptography, Encryption, Ciphers, Standards, Information science, Image resolution, Cryptanalysis, bitwise exclusive OR BibRef

Jain, K.[Kurunandan], Aji, A.[Aravind], Krishnan, P.[Prabhakar],
Medical Image Encryption Scheme Using Multiple Chaotic Maps,
PRL(152), 2021, pp. 356-364.
Elsevier DOI 2112
Telemedicine, Digital images, Chaotic map, Image encryption BibRef

Zhao, Y.K.[Yong-Kang], Fu, F.W.[Fang-Wei],
A contrast improved OR and XOR based (k,n) visual cryptography scheme without pixel expansion,
JVCIR(82), 2022, pp. 103408.
Elsevier DOI 2201
Visual cryptography, Multiple decryptions, Contrast, Perfect recovery, Threshold BibRef

Sang, Y.P.[Yong-Peng], Sang, J.[Jun], Alam, M.S.[Mohammad S.],
Image encryption based on logistic chaotic systems and deep autoencoder,
PRL(153), 2022, pp. 59-66.
Elsevier DOI 2201
Image encryption, Logistic chaotic systems, Deep autoencoder, Uniform distribution BibRef

Song, W.[Wei], Fu, C.[Chong], Tie, M.[Ming], Sham, C.W.[Chiu-Wing], Liu, J.[Jun], Ma, H.F.[Hong-Feng],
A fast parallel batch image encryption algorithm using intrinsic properties of chaos,
SP:IC(102), 2022, pp. 116628.
Elsevier DOI 2202
Batch image encryption, Chaos, Multithreading, Steganography BibRef

Sun, Y.J.[Yu-Jie], Zhang, H.[Hao], Li, Z.Y.[Zhen-Yu], Wang, X.Y.[Xing-Yuan], Wang, C.P.[Chun-Peng],
An image cipher system based on networked chaotic map with parameter q,
IET-IPR(16), No. 3, 2022, pp. 797-808.
DOI Link 2202
BibRef

Zhang, Y.S.[Yu-Shu], Zhao, R.[Ruoyu], Xiao, X.L.[Xiang-Li], Lan, R.[Rushi], Liu, Z.[Zhe], Zhang, X.P.[Xin-Peng],
HF-TPE: High-Fidelity Thumbnail- Preserving Encryption,
CirSysVideo(32), No. 3, March 2022, pp. 947-961.
IEEE DOI 2203
Encryption, Privacy, Usability, Cloud computing, Visualization, Software, Indexes, Balancing privacy and usability, cloud storage BibRef

Huang, S.F.[Shu-Feng], Huang, L.Q.[Lin-Qing], Cai, S.T.[Shu-Ting], Xiong, X.M.[Xiao-Ming], Liu, Y.[Yuan],
Novel and secure plaintext-related image encryption algorithm based on compressive sensing and tent-sine system,
IET-IPR(16), No. 6, 2022, pp. 1544-1557.
DOI Link 2204
BibRef

Chen, Y.C.[Yu-Chi], Horng, G.[Gwoboa],
Cheating in (halftone-secret) visual cryptography: Analysis of blind authentication schemes,
JVCIR(85), 2022, pp. 103489.
Elsevier DOI 2205
Visual cryptography, Human vision system, Binocular cheating, Cheating prevention, Security BibRef

Chai, X.L.[Xiu-Li], Wang, Y.J.[Yin-Jing], Chen, X.H.[Xiu-Hui], Gan, Z.H.[Zhi-Hua], Zhang, Y.S.[Yu-Shu],
TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key,
SPLetters(29), 2022, pp. 972-976.
IEEE DOI 2205
Ciphers, Encryption, Usability, Training, Privacy, Image coding, Visualization, CycleGan, deep learning, image encryption, privacy and usability BibRef

Chai, X.L.[Xiu-Li], Ma, Y.K.[Ya-Kun], Wang, Y.J.[Yig-Jing], Gan, Z.H.[Zhi-Hua], Zhang, Y.S.[Yu-Shu],
TPE-ADE: Thumbnail-Preserving Encryption Based on Adaptive Deviation Embedding for JPEG Images,
MultMed(26), 2024, pp. 6102-6116.
IEEE DOI 2404
Encryption, Transform coding, Ciphers, Privacy, Usability, Cryptography, Visualization, Thumbnail-preserving encryption, low-resolution image retrieval BibRef

Wen, W.Y.[Wen-Ying], Jiang, Q.Y.[Qi-Yu], Huang, H.G.[Hai-Gang], Zhang, Y.S.[Yu-Shu], Fang, Y.M.[Yu-Ming],
TPE-DF: Thumbnail Preserving Encryption via Dual-2DCS Fusion,
SPLetters(31), 2024, pp. 1039-1043.
IEEE DOI 2405
Visualization, Histograms, Encryption, Image reconstruction, Usability, Privacy, Cloud computing, 2D compressive sensing, thumbnail preserving encryption BibRef

Zhang, Y.S.[Yu-Shu], Zhou, W.T.[Wen-Tao], Zhao, R.[Ruoyu], Zhang, X.P.[Xin-Peng], Cao, X.C.[Xiao-Chun],
F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel Sum-Preserving Encryption,
MultMed(25), 2023, pp. 5877-5891.
IEEE DOI 2311
BibRef

Xian, Y.J.[Yong-Jin], Wang, X.Y.[Xing-Yuan], Teng, L.[Lin],
Double Parameters Fractal Sorting Matrix and Its Application in Image Encryption,
CirSysVideo(32), No. 6, June 2022, pp. 4028-4037.
IEEE DOI 2206
Sorting, Fractals, Security, Encryption, Iterative algorithms, Information security, Frequency modulation, image security BibRef

Wen, Y.[Yan], Su, J.M.[Jing-Ming], Hong, Y.[Yan], Gong, P.S.[Ping-Shun],
Hybrid mapping algorithm based on 1-DCM and Lorenz,
IET-IPR(16), No. 9, 2022, pp. 2467-2482.
DOI Link 2206
BibRef

Sheng, Y.H.[Yao-Hui], Li, J.Q.[Jin-Qing], Di, X.Q.[Xiao-Qiang], Man, Z.L.[Zhen-Long], Liu, Z.F.[Ze-Fei],
Bit-level image encryption algorithm based on fully-connected-like network and random modification of edge pixels,
IET-IPR(16), No. 10, 2022, pp. 2769-2790.
DOI Link 2207
BibRef

Maksud, A.[Ahmed], Hua, Y.[Yingbo],
Secret Key Generation by Continuous Encryption Before Quantization,
SPLetters(29), 2022, pp. 1497-1501.
IEEE DOI 2208
Quantization (signal), Biometrics (access control), Security, Encryption, Communication system security, Signal to noise ratio, wireless security BibRef

Tan, X.G.[Xue-Gang], Xiang, C.C.[Chang-Cheng], Cao, J.[Jinde], Xu, W.Y.[Wen-Ying], Wen, G.H.[Guang-Hui], Rutkowski, L.[Leszek],
Synchronization of Neural Networks via Periodic Self-Triggered Impulsive Control and Its Application in Image Encryption,
Cyber(52), No. 8, August 2022, pp. 8246-8257.
IEEE DOI 2208
Artificial neural networks, Synchronization, Real-time systems, Signal processing algorithms, Neurons, Monitoring, Encryption, synchronization BibRef

Wei, C.J.[Cheng-Jing], Li, G.D.[Guo-Dong],
A selective image encryption scheme using LICC hyperchaotic system,
IET-IPR(16), No. 12, 2022, pp. 3342-3358.
DOI Link 2209
closed-loop coupling. BibRef

Zhang, B.[Bo], Xiao, D.[Di], Li, Y.[Ying], Yang, L.[Lei],
2D Compressed Sensing Using Nonlocal Low-Rank Prior Reconstruction for Cipher-Image Coding,
SPLetters(29), 2022, pp. 2033-2037.
IEEE DOI 2210
Ciphers, Image coding, Image reconstruction, Encryption, Privacy, Iterative algorithms, Approximation algorithms, encryption-then-compression BibRef

Wu, X.T.[Xiao-Tian], Luo, Z.L.[Zhong-Lin],
Block-based progressive visual cryptography scheme with uniform progressive recovery and consistent background,
JVCIR(88), 2022, pp. 103631.
Elsevier DOI 2210
Secret sharing, Visual cryptography, Progressive recovery, Consistent background, Image block BibRef

Zhang, Y.[Yike], Luo, W.B.[Wen-Bin],
Vector-Based Efficient Data Hiding in Encrypted Images via Multi-MSB Replacement,
CirSysVideo(32), No. 11, November 2022, pp. 7359-7372.
IEEE DOI 2211
Image reconstruction, Encryption, Data privacy, Visualization, Image coding, Image restoration, Decoding, Reversible data hiding, location map BibRef

Zheng, J.M.[Ji-Ming], Lv, T.Y.[Tian-Yi],
Image encryption algorithm based on cascaded chaotic map and improved Zigzag transform,
IET-IPR(16), No. 14, 2022, pp. 3863-3875.
DOI Link 2212
BibRef

Wu, X.T.[Xiao-Tian], An, N.[Na], Xu, Z.[Zishuo],
Sharing Multiple Secrets in XOR-Based Visual Cryptography by Non-Monotonic Threshold Property,
CirSysVideo(33), No. 1, January 2023, pp. 88-103.
IEEE DOI 2301
Stacking, Visualization, Cryptography, Image reconstruction, Image quality, Authentication, Visual systems, Secret sharing, fully incrementing BibRef

Tang, J.[Jianeng], Zhang, Z.Z.[Ze-Zong], Chen, P.Y.[Pei-Yang], Zhang, F.[Feng], Ni, H.[Hui], Huang, Z.M.[Zhong-Ming],
An image layered scrambling encryption algorithm based on a novel discrete chaotic map,
IET-IPR(17), No. 2, 2023, pp. 518-532.
DOI Link 2302
BibRef

Alsubaei, F.S.[Faisal S.], Alneil, A.A.[Amani A.], Mohamed, A.[Abdullah], Hilal, A.M.[Anwer Mustafa],
Block-Scrambling-Based Encryption with Deep-Learning-Driven Remote Sensing Image Classification,
RS(15), No. 4, 2023, pp. xx-yy.
DOI Link 2303
BibRef

Sundaram, G.[Gaurav], Panna, B.[Bhaskar], Jha, R.K.[Rajib Kumar], Kumar, S.[Sumit],
Image encryption based on fractional discrete cosine transform and DWT with interplane arrangements in dost domain,
IET-IPR(17), No. 4, 2023, pp. 1195-1207.
DOI Link 2303
adaptive signal processing, image processing BibRef

Tang, B.[Bo], Yang, C.[Cheng], Zhang, Y.[Yana],
A Format Compliant Framework for HEVC Selective Encryption After Encoding,
CirSysVideo(33), No. 3, March 2023, pp. 1140-1156.
IEEE DOI 2303
Encoding, Encryption, Cryptography, Syntactics, Arithmetic, Symbols, Prediction algorithms, HEVC, encrypted after encoding, bit flipping and insertion-deletion BibRef

Sudha, K.A.[K. Antony], Castro, V.C.[V. Cibi], MuthuLakshmi, G., Parithi, T.I.[T. Ilam], Raja, S.P.,
A Chaotic Encryption System Based on DNA Coding Using a Deep Neural Network,
IJIG(23), No. 2 2023, pp. 2350020.
DOI Link 2303
BibRef

Wu, X.T.[Xiao-Tian], Fang, J.[Jia], Yan, W.Q.[Wei Qi],
Contrast Optimization for Size Invariant Visual Cryptography Scheme,
IP(32), 2023, pp. 2174-2189.
IEEE DOI 2304
Optimization, Linear programming, Cryptography, Visualization, Stacking, Image quality, Image reconstruction, Secret sharing, size invariant BibRef

Li, D.M.[Dong-Mei], Liu, H.K.[Hai-Kuan],
Provable image encryption scheme via trapdoor permutation,
IET-IPR(17), No. 5, 2023, pp. 1355-1363.
DOI Link 2304
image encryption, one-way function, random reuse, trapdoor permutation BibRef

Chen, Z.[Zan], Ma, C.C.[Chao-Cheng], Wang, T.[Tao], Feng, Y.J.[Yuan-Jing], Hou, X.S.[Xing-Song], Qian, X.M.[Xue-Ming],
Robust image compression-encryption via scrambled block bernoulli sampling with diffusion noise,
IET-IPR(17), No. 5, 2023, pp. 1478-1492.
DOI Link 2304
compressed sensing, image coding BibRef

Liu, Z.N.[Zi-Nan], Liu, T.[Tao], Yan, B.[Bin], Pan, J.S.[Jeng-Shyang], Yang, H.M.[Hong-Mei],
Multitone reconstruction visual cryptography based on phase periodicity,
JVCIR(93), 2023, pp. 103827.
Elsevier DOI 2305
Grayscale image, Visual cryptography, Phase periodicity, Light polarization BibRef

Jiang, X.M.[Xiao-Man], Jiang, G.Y.[Guang-Yu], Wang, Q.K.[Qing-Ke], Shu, D.D.[Dong-Dong],
Image encryption algorithm based on 2D-CLICM chaotic system,
IET-IPR(17), No. 7, 2023, pp. 2127-2141.
DOI Link 2305
Arnold transform, chaotic map, image encryption, image processing BibRef

Sammeta, N.[Naresh], Parthiban, L.[Latha],
Data Ownership and Secure Medical Data Transmission using Optimal Multiple Key-Based Homomorphic Encryption with Hyperledger Blockchain,
IJIG(23), No. 3 2023, pp. 2240003.
DOI Link 2306
BibRef

Xu, G.W.[Guo-Wen], Li, G.L.[Guan-Lin], Guo, S.W.[Shang-Wei], Zhang, T.W.[Tian-Wei], Li, H.W.[Hong-Wei],
Secure Decentralized Image Classification With Multiparty Homomorphic Encryption,
CirSysVideo(33), No. 7, July 2023, pp. 3185-3198.
IEEE DOI 2307
Training, Servers, Homomorphic encryption, Differential privacy, Deep learning, Public key, Data models, Privacy protection, homomorphic encryption BibRef

Chen, F.[Fan], Yang, Y.L.[Yao-Lin], He, H.J.[Hong-Jie], Yuan, Y.[Yuan],
Adaptive Coding and Ordered-Index Extended Scrambling Based RDH in Encrypted Images,
MultMed(25), 2023, pp. 2864-2875.
IEEE DOI 2307
Cryptography, Encryption, Image coding, Encoding, Correlation, Resists, Receivers, Reversible data hiding, image encryption, chosen plaintext attack (CPA) BibRef

Tang, Y.[Yun], Cheng, L.[Lulu], Lyu, W.L.[Wan-Li], Yin, Z.X.[Zhao-Xia],
High Capacity Reversible Data Hiding for Encrypted 3d Mesh Models Based on Topology,
IWDW22(205-218).
Springer DOI 2307
BibRef

Lata, N.[Navdeep], Kumar, R.[Raman],
DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image in IoT Communication,
IJIG(23), No. 4 2023, pp. 2350035.
DOI Link 2308
BibRef

Nazari, H.[Hadi], Bidgoli, M.M.[Mahmoud Mahlouji], Ghasvari, H.[Hossein],
Integration of lightweight cryptography and watermarking with compression for high speed and reliable communication of digital images in IoT,
IET-IPR(17), No. 10, 2023, pp. 2984-3001.
DOI Link 2308
compressed sensing, cryptography, watermarking, wavelet transforms BibRef

Gao, S.[Suo], Wu, R.[Rui], Wang, X.Y.[Xing-Yuan], Liu, J.F.[Jia-Feng], Li, Q.[Qi], Wang, C.P.[Chun-Peng], Tang, X.L.[Xiang-Long],
Asynchronous Updating Boolean Network Encryption Algorithm,
CirSysVideo(33), No. 8, August 2023, pp. 4388-4400.
IEEE DOI 2308
Encryption, Encoding, Cryptography, Trajectory, Bifurcation, Tensors, NIST, Chaos, image encryption, image processing, Boolean network BibRef

Wang, C.T.[Chun-Tao], Hu, J.[Juan], Bian, S.[Shan], Ni, J.Q.[Jiang-Qun], Zhang, X.P.[Xin-Peng],
A Customized Deep Network Based Encryption-Then-Lossy-Compression Scheme of Color Images Achieving Arbitrary Compression Ratios,
CirSysVideo(33), No. 8, August 2023, pp. 4322-4336.
IEEE DOI 2308
Image coding, Cryptography, Image reconstruction, Encryption, Color, Receivers, Optimization, Encrypted image compression, downsampling, downsampling constraint BibRef

Wang, C.T.[Chun-Tao], Zhang, T.J.[Tian-Jian], Chen, H.[Hao], Huang, Q.[Qiong], Ni, J.Q.[Jiang-Qun], Zhang, X.P.[Xin-Peng],
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network,
MultMed(25), 2023, pp. 4026-4040.
IEEE DOI 2310
BibRef

Wang, H.[Hao], Yang, X.[Xinsong], Xiang, Z.R.[Zheng-Rong], Tang, R.Q.[Rong-Qiang], Ning, Q.[Qian],
Synchronization of Switched Neural Networks via Attacked Mode-Dependent Event-Triggered Control and Its Application in Image Encryption,
Cyber(53), No. 9, September 2023, pp. 5994-6003.
IEEE DOI 2309
BibRef

Chen, W.[Wei], Wang, Y.C.[Yi-Chuan], Xiao, Y.Q.[Ye-Qiu], Hei, X.H.[Xin-Hong],
Explore the potential of deep learning and hyperchaotic map in the meaningful visual image encryption scheme,
IET-IPR(17), No. 11, 2023, pp. 3235-3257.
DOI Link 2310
chaos, image colour analysis, image processing BibRef

Su, Y.[Yining], Teng, L.[Lin], Liu, P.[Pengbo], Unar, S.[Salahuddin], Wang, X.Y.[Xing-Yuan], Fu, X.P.[Xian-Ping],
Visualized Multiple Image Selection Encryption Based on Log Chaos System and Multilayer Cellular Automata Saliency Detection,
CirSysVideo(33), No. 9, September 2023, pp. 4689-4702.
IEEE DOI 2310
BibRef

Zheng, J.M.[Ji-Ming], Bao, T.Y.[Tian-Yu],
An image encryption algorithm based on cascade chaotic map and DNA coding,
IET-IPR(17), No. 12, 2023, pp. 3510-3523.
DOI Link 2310
chaos, data privacy, image processing BibRef

Meng, K.[Ke], Wo, Y.[Yan],
An image compression and encryption scheme for similarity retrieval,
SP:IC(119), 2023, pp. 117044.
Elsevier DOI 2310
Information bottleneck, Compressed domain retrieval, Retrieval encryption, Cascade compression encryption, Image similarity retrieval BibRef

Jameel, S.K.[Samer Kais], Majidpour, J.[Jafar],
BCS-AE: Integrated Image Compression-Encryption Model Based on AE and Block-CS,
IJIG(23), No. 5 2023, pp. 2350047.
DOI Link 2310
BibRef

Jansen-van Rensburg, B.[Bianca], Puech, W.[William], Pedeboy, J.P.[Jean-Pierre],
A Format Compliant Encryption Method for 3D Objects Allowing Hierarchical Decryption,
MultMed(25), 2023, pp. 7196-7207.
IEEE DOI 2311
BibRef

Sajitha, A.S., Priya, S.S.S.[S. Sridevi Sathya],
Analysis of Various Visual Cryptographic Techniques and their Issues Based on Optimization Algorithms,
IJIG(23), No. 6 2023, pp. 2350059.
DOI Link 2312
BibRef

Yan, P.F.[Peng-Fei], Zhang, H.[Hao], Zhang, C.[Chuan], Chang, R.Y.[Rui-Yun], Sun, Y.J.[Yu-Jie],
Synchronization of Boolean networks with chaos-driving and its application in image cryptosystem,
IET-IPR(17), No. 14, 2023, pp. 4176-4189.
DOI Link 2312
biology computing, chaos, compressed sensing, cryptography, image coding BibRef

Gadde, S.[Swetha], Amutharaj, J., Usha, S.,
Cloud Multimedia Data Security by Optimization-Assisted Cryptographic Technique,
IJIG(24), No. 1, Januaur 2024, pp. 2450010.
DOI Link 2402
BibRef

Li, L.Z.[Li-Zong],
Image encryption algorithm based on hyperchaos and DNA coding,
IET-IPR(18), No. 3, 2024, pp. 627-649.
DOI Link 2402
DNA coding, hyperchaotic system, image diffusion, image encryption BibRef

Yan, Y.Q.[Yu-Qian], Wang, Y.[Yue], Xue, L.L.[Lin-Lin], Qiu, W.W.[Wei-Wei], Wang, Z.[Zhongpeng],
2D compressed sensing of encrypted images based on complex-valued measurement matrix,
IET-IPR(18), No. 3, 2024, pp. 572-588.
DOI Link 2402
chaos, compressed sensing, image processing, security of data BibRef

Li, L.Z.[Li-Zong],
Image encryption algorithm based on hyperchaos and DNA coding,
IET-IPR(18), No. 3, 2024, pp. 627-649.
DOI Link 2402
DNA coding, hyperchaotic system, image diffusion, image encryption BibRef

Zhang, C.[Chengrui], Chen, J.X.[Jun-Xin], Chen, D.M.[Dong-Ming], Wang, W.[Wei], Zhang, Y.S.[Yu-Shu], Zhou, Y.C.[Yi-Cong],
Exploiting Substitution Box for Cryptanalyzing Image Encryption Schemes With DNA Coding and Nonlinear Dynamics,
MultMed(26), 2024, pp. 1114-1128.
IEEE DOI 2402
Encryption, DNA, Encoding, Ciphers, Image coding, Security, Decoding, Chosen-plaintext attack, DNA coding, image encryption, S-box matrix BibRef

Li, C.Q.[Cheng-Qing], Shen, X.H.[Xian-Hui], Liu, S.[Sheng],
Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D Lag-Complex Logistic Map,
MultMedMag(31), No. 1, January 2024, pp. 99-109.
IEEE DOI 2404
Encryption, Logistics, Heuristic algorithms, Social networking (online), Resists, Algorithm design and analysis BibRef

Gong, M.X.[Meng-Xin], Chai, X.L.[Xiu-Li], Lu, Y.[Yang], Zhang, Y.S.[Yu-Shu],
Exploiting Four-Dimensional Chaotic Systems With Dissipation and Optimized Logical Operations for Secure Image Compression and Encryption,
CirSysVideo(34), No. 8, August 2024, pp. 7628-7642.
IEEE DOI 2408
Encryption, Chaotic communication, Security, Image coding, Neurons, Image reconstruction, Heuristic algorithms, Image encryption, logical operation BibRef

Xin, Z.[Zihao], Liu, S.[Sheng], Zhou, X.Y.[Xiao-Yi], Han, W.B.[Wen-Bao], Ma, J.Q.[Jian-Qiang],
A metaheuristic image cryptosystem using improved parallel model and many-objective optimization,
IET-IPR(18), No. 11, 2024, pp. 2838-2854.
DOI Link 2409
chaos, image processing, optimisation, parallel processing BibRef

Shi, J.L.[Jiao-Li], Hu, C.[Chao], Zhang, S.L.[Shun-Li], Zhou, Q.[Qing], Mei, Z.L.[Zhuo-Lin], Yao, S.M.[Shi-Mao], Deng, A.[Anyuan],
An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems,
IJGI(13), No. 9, 2024, pp. 321.
DOI Link 2410
BibRef

Zhang, L.[Luozhi], Wang, Q.[Qionghua], Yu, Z.[Zhan], Li, J.X.[Jin-Xi], Bai, X.[Xing], Zhou, X.[Xin], Wu, Y.Y.[Yuan-Yuan],
Non-Cascaded and Crosstalk-Free Multi-Image Encryption Based on Optical Scanning Holography Using 2D Orthogonal Compressive Sensing,
IP(33), 2024, pp. 5688-5702.
IEEE DOI 2410
Encryption, Compressed sensing, Pupils, Holography, Security, Crosstalk, Noise, Image coding, Optical sensors, Optical imaging, synthesis pupil encoding BibRef

Wang, Y.[Yu], Chen, L.Q.[Li-Quan], Yu, K.[Kunliang], Fu, T.[Tong],
A Secure Spatio-Temporal Chaotic Pseudorandom Generator for Image Encryption,
CirSysVideo(34), No. 9, September 2024, pp. 8509-8521.
IEEE DOI 2410
Encryption, Security, Generators, Lattices, Chaotic communication, Chaos, Degradation, UKF, spatio-temporal chaotic, PRNG, provably security BibRef

Hosny, K.M.[Khalid M.], Elnabawy, Y.M.[Yasmin M.], Elshewey, A.M.[Ahmed M.], Alhammad, S.M.[Sarah M.], Khafaga, D.S.[Doaa Sami], Salama, R.[Rania],
New method of colour image encryption using triple chaotic maps,
IET-IPR(18), No. 12, 2024, pp. 3262-3276.
DOI Link 2411
chaos, encoding, image coding BibRef


Chen, Z.K.[Zi-Kang], Jiang, M.[Min], Chen, J.H.[Jia-Hua], Zhou, Y.G.[Yan-Gui],
Visual cryptography scheme by freeform optics based on optimal mass transport,
CVIDL23(42-46)
IEEE DOI 2403
Visualization, Privacy, Simulation, Virtual environments, Optics, Encryption, Internet, information hiding, visual cryptography, freeform optics BibRef

Rai, D.[Deepak], Rajput, S.S.[Shayam Singh], Arya, K.V., Pranav, P.[Prince], Singh, S.[Shikha], Sinha, A.[Aditi],
Advanced Encryption Standard (AES) Based Robust Watermarking Scheme,
ICCVMI23(1-4)
IEEE DOI 2403
Resistance, Low-pass filters, Watermarking, Rate distortion theory, Intellectual property, Media, Robustness, Watermarking, Encryption, DWT BibRef

Peng, H.[Hongwu], Huang, S.[Shaoyi], Zhou, T.[Tong], Luo, Y.[Yukui], Wang, C.H.[Cheng-Hong], Wang, Z.[Zigeng], Zhao, J.[Jiahui], Xie, X.[Xi], Li, A.[Ang], Geng, T.[Tony], Mahmood, K.[Kaleel], Wen, W.[Wujie], Xu, X.L.[Xiao-Lin], Ding, C.[Caiwen],
AutoReP: Automatic ReLU Replacement for Fast Private Network Inference,
ICCV23(5155-5165)
IEEE DOI 2401
Machine learning as a service. Data security. BibRef

Chen, Y.L.[Yi-Ling], Yao, Y.Z.[Yuan-Zhi], Yu, N.H.[Neng-Hai],
Image Translation-Based Deniable Encryption against Model Extraction Attack,
ICIP23(1330-1334)
IEEE DOI 2312
BibRef

Puteaux, P.[Pauline], Puech, W.[William],
Localization and Correction of Corrupted Pixel Blocks in Noisy Encrypted Images,
IPTA20(1-6)
IEEE DOI 2206
Training, Tools, Elliptic curve cryptography, Error correction codes, Cryptography, Noise measurement, signal processing in the encrypted domain BibRef

Zheng, H.Y.[Hong-Ying], Huang, Y.W.[Ya-Wen], Li, L.[Lin], Xiao, D.[Di],
Compressive Sensing-Based Image Encryption and Authentication in Edge-Clouds,
MMMod22(II:382-393).
Springer DOI 2203
BibRef

Zhang, Y.[Yong], Chen, A.[Aiguo], Tang, Y.J.[Ying-Jun], Ding, X.[Xiong], Jiang, N.[Na], Sun, Q.F.[Qian-Feng],
Comments on Test Methods of Encryption and Decryption Speeds of Image Cryptosystems,
ICIVC21(284-288)
IEEE DOI 2112
Chaos, Tungsten, Benchmark testing, Hardware, Encryption, C# languages, Indexes, image encryption, encryption and decryption speeds, speed comparison BibRef

Tian, J.[Jinyu], Zhou, J.T.[Jian-Tao], Duan, J.[Jia],
Probabilistic Selective Encryption of Convolutional Neural Networks for Hierarchical Services,
CVPR21(2205-2214)
IEEE DOI 2111
Training, Degradation, Costs, Computational modeling, Noise reduction, Probabilistic logic BibRef

Yao, L.S.[Li-Sha], Xu, G.M.[Guo-Ming], Zhao, F.[Feng],
Application of Fish-swarm and Genetic Algorithm in Optimization of Chaotic Image Encryption,
CVIDL20(76-83)
IEEE DOI 2102
chaos, cryptography, genetic algorithms, image coding, genetic algorithm, image encrytion algorithm, Chaotic function BibRef

Chen, Q.Q.[Qiu-Qiong], Dai, Y.[Yao], Niu, Z.Y.[Zhi-Yong],
An Image Encryption Algorithm Based on Combination of Chaos and DNA Encoding,
CVIDL20(182-185)
IEEE DOI 2102
chaos, cryptography, image coding, matrix algebra, random sequences, digital image encryption algorithm, cryptographic method, Security analysis BibRef

Chmielewski, L.J.[Leszek J.], Orlowski, A.[Arkadiusz],
Does Randomness in the Random Visual Cryptography Protocol Depend on the Period of Pseudorandom Number Generators?,
ICCVG20(36-47).
Springer DOI 2009
BibRef

Bian, S.[Song], Wang, T.C.[Tian-Chen], Hiromoto, M.[Masayuki], Shi, Y.[Yiyu], Sato, T.[Takashi],
ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic Convolution for Privacy-Preserving Visual Recognition,
CVPR20(9400-9409)
IEEE DOI 2008
Convolution, Protocols, Frequency-domain analysis, Neural networks, Encryption, Visualization BibRef

Sedighi, M., Mahmoudi, S.K., Amini, A.S.,
Proposing a New Method for Encrypting Satellite Images Based On Hash Function and Chaos Parameters,
SMPR19(949-953).
DOI Link 1912
BibRef

Puteaux, P.[Pauline], Puech, W.[William],
Image Analysis and Processing in the Encrypted Domain,
ICIP19(3020-3022)
IEEE DOI 1910
Direct processing in encrypted domain. Multimedia security, image encryption, signal processing in the encrypted domain BibRef

Lee, S., Huang, Y., Lin, J.,
WEB-VC: Visual Cryptography for Web Image,
ICIP19(4055-4059)
IEEE DOI 1910
Visual cryptography, flip visual cryptography, secret image sharing, visual secret sharing, Web VC BibRef

Bellafqira, R.[Reda], Coatrieux, G.[Gouenou], Genin, E.[Emmanuelle], Cozic, M.[Michel],
Secure Multilayer Perceptron Based on Homomorphic Encryption,
IWDW18(322-336).
Springer DOI 1905
BibRef

Liu, Z., Yang, M.L., Yan, W.Q.,
Image encryption based on double random phase encoding,
IVCNZ17(1-6)
IEEE DOI 1902
cryptography, discrete cosine transforms, discrete Fourier transforms, image coding, matrix algebra, logistic map BibRef

Touil, H., Akkad, N.E., Satori, K.,
Text Encryption: Hybrid cryptographic method using Vigenere and Hill Ciphers.,
ISCV20(1-6)
IEEE DOI 2011
cryptography, data privacy, text analysis, computer networks, cryptography, Cesar encryption algorithm, Statistical attack. BibRef

Es-sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K.,
Grayscale image encryption using shift bits operations,
ISCV18(1-7)
IEEE DOI 1807
cryptography, image processing, (N-1) generated images, cryptography, decryption process, grayscale image encryption, Key BibRef

Hamici, Z.,
Image cryptography based on the imitation of gene fusion and horizontal gene transfer,
IPTA17(1-6)
IEEE DOI 1804
cryptography, feature extraction, genetic algorithms, image coding, image fusion, image representation, random sequences, HGT, obfuscation BibRef

Kang, X., Han, Z., Yu, A., Duan, P.,
Double random scrambling encoding in the RPMPFrHT domain,
ICIP17(4362-4366)
IEEE DOI 1803
Cryptography, Encoding, Indexes, Performance analysis, Robustness, Sensitivity, Hartley transform, Image encryption, logistic map BibRef

Yonetani, R., Boddeti, V.N., Kitani, K.M., Sato, Y.,
Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic Encryption,
ICCV17(2059-2069)
IEEE DOI 1802
cryptography, data privacy, image processing, learning (artificial intelligence), Visualization BibRef

Zhang, Y., Li, X.Q.[Xue-Qian], Hou, W.G.[Wen-Gang],
A fast image encryption scheme based on AES,
ICIVC17(624-628)
IEEE DOI 1708
Ciphers, Correlation, Encryption, Histograms, Information entropy, Sensitivity, aes, cipher block chaining, image encryption, information, security BibRef

Yan, B.[Bing], Bai, S.,
Design of image confusion-diffusion cryptosystem based on vector quantization and cross chaotic map,
ICIVC17(639-644)
IEEE DOI 1708
Decoding, Encryption, Image coding, Indexes, Sensitivity analysis, confusion-diffusion cryptosystem, cross chaotic map, image compression and encryption, vector, quantization BibRef

Shen, G.[Gang], Liu, F.[Feng], Fu, Z.X.[Zheng-Xin], Yu, B.[Bin], Wang, W.[Wen],
Halftone Visual Cryptography with Complementary Cover Images,
IWDW16(223-237).
Springer DOI 1703
BibRef

Wang, W.[Wen], Liu, F.[Feng], Guo, T.[Teng], Ren, Y.W.[Ya-Wei],
Temporal Integration Based Visual Cryptography Scheme and Its Application,
IWDW17(406-419).
Springer DOI 1708
BibRef
Earlier: A4, A2, A1, Only:
Collusive Attacks to Partition Authentication Visual Cryptography Scheme,
IWDW16(238-250).
Springer DOI 1703
BibRef

Dutta, S.[Sabyasachi], Roy, P.S.[Partha Sarathi], Adhikari, A.[Avishek], Sakurai, K.[Kouichi],
On the Robustness of Visual Cryptographic Schemes,
IWDW16(251-262).
Springer DOI 1703
BibRef

Goel, A., Chaudhari, K.,
Median based pixel selection for partial image encryption,
IPTA16(1-5)
IEEE DOI 1703
cryptography BibRef

Wen, W., Zhang, Y., Fang, Y., Fang, Z.,
A novel selective image encryption method based on saliency detection,
VCIP16(1-4)
IEEE DOI 1701
Discrete wavelet transforms BibRef

Abdmouleh, M.K.[Med Karim], Khalfallah, A.[Ali], Bouhlel, M.S.[Med Salim],
A Chaotic Cryptosystem for Color Image with Dynamic Look-Up Table,
ICISP16(91-100).
WWW Link. 1606
BibRef

Fatahbeygi, A., Akhlaghian, F.,
A new robust semi-blind image watermarking based on block classification and visual cryptography,
IPRIA15(1-6)
IEEE DOI 1603
cryptography BibRef

Belkaid, B.M., Mourad, L., Mehdi, C., Soltane, A.,
Secure transfer of medical images using hybrid encryption: Authentication, confidentiality, integrity,
ICCVIA15(1-6)
IEEE DOI 1603
authorisation BibRef

Jolfaei, A.[Alireza], Wu, X.W.[Xin-Wen], Muthukkumarasamy, V.[Vallipuram],
A Secure Lightweight Texture Encryption Scheme,
VSWS15(344-356).
Springer DOI 1603
BibRef

Wang, D.S.[Dao-Shun], Yi, F.[Feng], Yang, C.N.[Ching-Nung],
Visual Cryptography Scheme with Autostereogram,
IWDW14(364-375).
Springer DOI 1602
BibRef

Chen, Y.C.[Yu-Chi], Lu, K.H.[Kun-Han], Tso, R.L.[Ray-Lin], Wu, M.E.[Mu-En],
An Improved Visual Cryptography with Cheating Prevention,
IWDW14(444-454).
Springer DOI 1602
BibRef

Liu, F.[Feng], Wu, C.K.[Chuan-Kun],
Optimal XOR Based (2,n)-Visual Cryptography Schemes,
IWDW14(333-349).
Springer DOI 1602
BibRef

Liu, S.C.[Shen-Chuan], Fujiyoshi, M.[Masaaki], Kiya, H.[Hitoshi],
A cheat preventing method with efficient pixel expansion for Naor-Shamir's visual cryptography,
ICIP14(5527-5531)
IEEE DOI 1502
Cloud computing BibRef

Eluard, M.[Marc], Maetz, Y.[Yves], Doerr, G.[Gwenael],
Impact of geometry-preserving encryption on rendering time,
ICIP14(4787-4791)
IEEE DOI 1502
Collaboration BibRef

Moreno Cañadas, A.[Agustín], Palma Vanegas, N.P.[Nelly Paola], Hernández Quitián, M.[Margoth],
Visual Cryptography Schemes Based in k -Linear Maps,
IWDW13(288-302).
Springer DOI 1407
BibRef

Panduranga, H.T., Kumar, H.S.S.[H.S. Sharath], Kumar, S.K.N.[S.K. Naveen],
Hybrid approach for dual image encryption using nibble exchange and Hill-cipher,
IMVIP12(101-104).
IEEE DOI 1302
BibRef

Liu, F.[Feng], Guo, T.[Teng], Wu, C.[ChuanKun], Yang, C.N.[Ching-Nung],
Flexible Visual Cryptography Scheme without Distortion,
IWDW11(211-227).
Springer DOI 1208
BibRef

Di, H.[Hong], Zheng, K.F.[Kang-Feng], Niu, X.X.[Xin-Xin], Zhang, X.[Xin],
Multiple-image compressed encryption and decryption by compressive holography,
VCIP11(1-4).
IEEE DOI 1201
BibRef

Bajaj, N.[Nikesh], Thakur, A.[Amit],
Enhancement of RC5 for image encryption,
ICIIP11(1-5).
IEEE DOI 1112
BibRef

Goumidi, D.E., Hachouf, F.,
Modified confusion-diffusion based satellite image cipher using chaotic standard, logistic and sine maps,
EUVIP10(204-209).
IEEE DOI 1110
BibRef

Petrauskiene, V., Ragulskiene, J., Sakyte, E., Ragulskis, M.,
Near-Optimal Time Function for Secure Dynamic Visual Cryptography,
ISVC11(II: 300-309).
Springer DOI 1109
BibRef

Nien, H.H., Changchien, S.K., Wu, S.Y., Huang, C.K.,
A new Pixel-Chaotic-Shuffle method for image encryption,
ICARCV08(883-887).
IEEE DOI 1109
BibRef

Zhao, L.[Liang], Adhikari, A.[Avishek], Sakurai, K.[Kouichi],
A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane,
DW10(29-44).
Springer DOI 1010
BibRef

Zhao, L.[Liang], Adhikari, A.[Avishek], Xiao, D.[Di], Sakurai, K.[Kouichi],
Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit,
DW10(45-59).
Springer DOI 1010
BibRef

Faridnia, S.[Saed], Faez, K.[Karim],
Image Encryption through Using Chaotic Function and Graph,
ICCVG10(I: 352-359).
Springer DOI 1009
BibRef

Ratan, R.[Ram],
Key Independent Retrieval of Chaotic Encrypted Images,
PReMI09(483-488).
Springer DOI 0912
BibRef

Mayouf, M.A.[Mabroka Ali], Shukur, Z.[Zarina],
Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols,
IVIC09(510-520).
Springer DOI 0911
BibRef

Rane, S.D.[Shantanu D.], Sun, W.[Wei], Vetro, A.[Anthony],
Secure distortion computation among untrusting parties using homomorphic encryption,
ICIP09(1485-1488).
IEEE DOI 0911
BibRef

Zhang, J.H.[Jian-Hong], Chen, H.[Hua], Geng, Q.[Qin],
Cryptoanalysis of Certificateless Partially Blind Signature and Proxy Blind Signature Scheme,
CISP09(1-5).
IEEE DOI 0910
BibRef

Zhang, J.H.[Jian-Hong], Gao, S.N.[Sheng-Nan],
Cryptoanlaysis of Two Proxy Blind Signature Schemes with Proxy Revocation,
CISP09(1-4).
IEEE DOI 0910
BibRef

Lang, J.[Jun], Tao, R.[Ran], Wang, Y.[Yue],
The Generalized Weighted Fractional Fourier Transform and its Application to Image Encryption,
CISP09(1-5).
IEEE DOI 0910
BibRef

Cao, Y.[Yun], Qiu, R.[Runhe], Fu, Y.Z.[Yu-Zhe],
Color Image Encryption Based on Hyper-Chaos,
CISP09(1-6).
IEEE DOI 0910
BibRef

He, B.[Bo], Zhang, F.[Fang], Luo, L.Y.[Long-Yan], Du, M.K.[Mao-Kang], Wang, Y.[Yong],
An Image Encryption Algorithm Based on Spatiotemporal Chaos,
CISP09(1-5).
IEEE DOI 0910
BibRef

Zhang, S.[Shuo], Cai, R.[Ruhua], Jiang, Y.C.[Ying-Chun], Guo, S.P.[Shi-Ping],
An Image Encryption Algorithm Based on Multiple Chaos and Wavelet Transform,
CISP09(1-5).
IEEE DOI 0910
BibRef

Xiao, Y.[Yu], Zhang, H.Y.[Hai-Ying], Ran, Q.W.[Qi-Wen], Zhang, J.[Jin], Tan, L.Y.[Li-Ying],
Image Encryption and Two Dimensional Discrete M-Parameter Fractional Fourier Transform,
CISP09(1-4).
IEEE DOI 0910
BibRef

Podoba, T., Giesl, J., Vlcek, K.,
Image Encryption In Wavelet Domain Based on Chaotic Maps,
CISP09(1-5).
IEEE DOI 0910
BibRef

Weir, J.[Jonathan], Yan, W.Q.[Wei-Qi],
Authenticating Visual Cryptography Shares Using 2D Barcodes,
IWDW11(196-210).
Springer DOI 1208
BibRef
Earlier:
Plane Transform Visual Cryptography,
DW10(60-74).
Springer DOI 1010
BibRef
Earlier:
Image Hatching for Visual Cryptography,
IMVIP09(59-64).
IEEE DOI 0909
BibRef
And:
Dot-Size Variant Visual Cryptography,
DW09(136-148).
Springer DOI 0908
BibRef

Piper, F.[Fred],
The Changing Face of Cryptography,
DW09(2).
Springer DOI 0908
BibRef

Chen, W.B.[Wei-Bin], Zhang, X.[Xin],
Image encryption algorithm based on Henon chaotic system,
IASP09(94-97).
IEEE DOI 0904
BibRef

Du, Y.F.[Yan-Fang], Zhang, J.[Jing], Su, Y.T.[Yu-Ting],
Watermarking for Authentication of LZ-77 Compressed Documents,
DW07(365-372).
Springer DOI 0712
BibRef

Luo, H.[Hao], Lu, Z.M.[Zhe-Ming], Pan, J.S.[Jeng-Shyang],
Multiple Watermarking in Visual Cryptography,
DW07(60-70).
Springer DOI 0712
BibRef

Sadeghi, A.R.[Ahmad-Reza],
The Marriage of Cryptography and Watermarking: Beneficial and Challenging for Secure Watermarking and Detection,
DW07(2-18).
Springer DOI 0712
BibRef

He, D.[Dake], Jagmohan, A.[Ashish], Lu, L.G.[Li-Gang],
Secure collaboration using Slepian-Wolf codes,
ICIP08(2216-2219).
IEEE DOI 0810
BibRef

Seshadrinathan, M.[Manoj], Dempski, K.L.[Kelly L.],
Implementation of Advanced Encryption Standard for encryption and decryption of images and text on a GPU,
CVGPU08(1-6).
IEEE DOI 0806
BibRef

Alface, P.R.[Patrice Rondao], Macq, B.[Benoit], Cayre, F.[Francois],
Blind and Robust Watermarking of 3D Models: How to Withstand the Cropping Attack?,
ICIP07(V: 465-468).
IEEE DOI 0709
BibRef

Huang, T.J.[Tie-Jun],
Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring,
MCAM07(65-75).
Springer DOI 0706
BibRef

Lai, J.C.[Jen-Chieh], Wang, C.H.[Chia-Hui],
Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services,
PSIVT06(888-897).
Springer DOI 0612
BibRef

Li, W.H.[Wei-Hai], Yuan, Y.[Yuan],
Visual Information Encryption in Frequency Domain: Risk and Enhancement,
IWICPAS06(225-234).
Springer DOI 0608
BibRef

Wong, A., Bishop, W.,
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption,
CRV06(51-51).
IEEE DOI 0607
BibRef

Said, A.,
Measuring the Strength of Partial Encryption Schemes,
ICIP05(II: 1126-1129).
IEEE DOI 0512
BibRef

Katzenbeisser, S.[Stefan],
On the Integration of Watermarks and Cryptography,
DW03(50-60).
Springer DOI 0405
BibRef

Li, S.J.[Shu-Jun], Zheng, X.[Xuan],
On the security of an image encryption method,
ICIP02(II: 925-928).
IEEE DOI 0210
BibRef

Yamaguchi, Y.S.[Yasu-Shi],
An Extended Visual Cryptography Scheme for Continuous-Tone Images,
IWDW11(228-242).
Springer DOI 1208
BibRef

Nakajima, M., Yamaguchi, Y.S.[Yasu-Shi],
Extended Visual Cryptography for Natural Images,
WSCG02(303).
HTML Version. 0209
BibRef

Han, K., Tewfik, A.,
Scalable Cryptographic Scheme for Networked Multimedia Applications,
ICIP01(III: 987-990).
IEEE DOI 0108
BibRef

Chen, Y.C., Chang, L.W.,
A Secure and Robust Digital Watermarking Technique by the Block Cipher Rc6 and Secure Hash Algorithm,
ICIP01(II: 518-521).
IEEE DOI 0108
BibRef

Bhattacharjee, S., Kutter, M.,
Compression tolerant image authentication,
ICIP98(I: 435-439).
IEEE DOI 9810
BibRef

Creusere, C.D., Mitra, S.K.,
Efficient image scrambling using polyphase filter banks,
ICIP94(II: 81-85).
IEEE DOI 9411
BibRef

Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Encryption or JPEG Coded Images, JPEG and Encryption .


Last update:Nov 26, 2024 at 16:40:19