Scharinger, J.,
Fast Encryption of Image Data Using Chaotic Kolmogorov Flows,
JEI(7), No. 2, April 1998, pp. 318-325.
9807
BibRef
Chuang, T.J.,
Lin, J.C.,
New Approach to Image Encryption,
JEI(7), No. 2, April 1998, pp. 350-356.
9807
BibRef
Chung, K.L.,
Chang, L.C.,
Large Encrypting Binary Images with Higher Security,
PRL(19), No. 5-6, April 1998, pp. 461-468.
9808
See also Cryptanalysis of an encryption scheme for binary images.
BibRef
Aikawa, M.,
Takaragi, K.,
Furuya, S.,
Sasamoto, M.,
A Lightweight Encryption Method Suitable For Copyright Protection,
Consumer(44), No. 3, August 1998, pp. 902-910.
9810
BibRef
Yen, J.C.,
Guo, J.I.,
Efficient hierarchical chaotic image encryption algorithm and its VLSI
realisation,
VISP(147), No. 2, April 2000, pp. 167.
0005
BibRef
Maniccam, S.S.,
Bourbakis, N.G.,
Lossless image compression and encryption using SCAN,
PR(34), No. 6, June 2001, pp. 1229-1245.
Elsevier DOI
0103
Encryption.
BibRef
Maniccam, S.S.,
Bourbakis, N.G.,
Image and video encryption using SCAN patterns,
PR(37), No. 4, April 2004, pp. 725-737.
Elsevier DOI
0403
BibRef
Chang, C.C.[Chin-Chen],
Chuang, J.C.[Jun-Chou],
An image intellectual property protection scheme for gray-level images
using visual secret sharing strategy,
PRL(23), No. 8, June 2002, pp. 931-941.
Elsevier DOI
0204
BibRef
Chang, C.C.[Chin-Chen],
Yu, T.X.[Tai-Xing],
Cryptanalysis of an encryption scheme for binary images,
PRL(23), No. 14, December 2002, pp. 1847-1852.
Elsevier DOI
0208
Shows how earlier method (
See also Large Encrypting Binary Images with Higher Security. ) can be broken.
BibRef
Chang, C.C.,
Hwang, K.F.,
Hwang, M.S.,
Robust authentication scheme for protecting copyrights of images and
graphics,
VISP(149), No. 1, February 2002, pp. 43-50.
IEEE Top Reference.
0205
BibRef
Alberti, C.,
Romeo, A.,
Mattavelli, M.,
Intellectual property management and protection for MPEG multimedia
content: A structured language for interoperable IPMP systems,
IJIST(13), No. 5, 2003, pp. 275-288.
DOI Link
0312
BibRef
Lin, C.C.[Chang-Chou],
Tsai, W.H.[Wen-Hsiang],
Visual cryptography for gray-level images by dithering techniques,
PRL(24), No. 1-3, January 2003, pp. 349-358.
Elsevier DOI
0211
BibRef
Hou, Y.C.[Young-Chang],
Visual cryptography for color images,
PR(36), No. 7, July 2003, pp. 1619-1629.
Elsevier DOI
0304
BibRef
Zhao, Y.,
Campisi, P.,
Kundur, D.,
Dual Domain Watermarking for Authentication and Compression of Cultural
Heritage Images,
IP(13), No. 3, March 2004, pp. 430-448.
IEEE DOI
0404
BibRef
Maiorana, E.[Emanuele],
Campisi, P.[Patrizio],
High-capacity watermarking of high dynamic range images,
JIVP(2016), No. 1, 2016, pp. 3.
DOI Link
1601
BibRef
Lukac, R.[Rastislav],
Plataniotis, K.N.[Konstantinos N.],
Bit-level based secret sharing for image encryption,
PR(38), No. 5, May 2005, pp. 767-772.
Elsevier DOI
0501
BibRef
Earlier:
Document image secret sharing using bit-level processing,
ICIP04(V: 2893-2896).
IEEE DOI
0505
BibRef
Lukac, R.[Rastislav],
Plataniotis, K.N.[Konstantinos N.],
A cost-effective encryption scheme for color images,
RealTimeImg(11), No. 5-6, October-December 2005, pp. 454-464.
Elsevier DOI
0510
BibRef
Heidarinejad, M.[Mohsen],
Plataniotis, K.N.[Konstantinos N.],
A second generation Visual Secret Sharing scheme for color images,
ICIP08(481-484).
IEEE DOI
0810
BibRef
Celik, M.U.,
Sharma, G.,
Tekalp, A.M.,
Lossless Watermarking for Image Authentication:
A New Framework and an Implementation,
IP(15), No. 4, April 2006, pp. 1042-1049.
IEEE DOI
0604
BibRef
Wang, R.Z.[Ran-Zan],
Region Incrementing Visual Cryptography,
SPLetters(16), No. 8, August 2009, pp. 659-662.
IEEE DOI
0906
BibRef
Amador, J.J.[José J.],
Green, R.W.[Robert W.],
Symmetric-key block cipher for image and text cryptography,
IJIST(15), No. 3, 2005, pp. 178-188.
DOI Link
0510
BibRef
Pareek, N.K.,
Patidar, V.[Vinod],
Sud, K.K.,
Image encryption using chaotic logistic map,
IVC(24), No. 9, September 2006, pp. 926-934.
Elsevier DOI
0608
Image cipher; Chaotic cryptography; Logistic map
BibRef
Hu, C.M.,
Tzeng, W.G.,
Cheating Prevention in Visual Cryptography,
IP(16), No. 1, January 2007, pp. 36-45.
IEEE DOI
0701
See also Comment on Cheating Prevention in Visual Cryptography.
BibRef
Chen, R.J.[Rong-Jian],
Lai, J.L.[Jui-Lin],
Image security system using recursive cellular automata substitution,
PR(40), No. 5, May 2007, pp. 1621-1631.
Elsevier DOI
0702
Image processing; Cellular automata; Image security; Encryption; Decryption
BibRef
Wang, D.S.[Dao-Shun],
Zhang, L.[Lei],
Ma, N.[Ning],
Li, X.B.[Xiao-Bo],
Two secret sharing schemes based on Boolean operations,
PR(40), No. 10, October 2007, pp. 2776-2785.
Elsevier DOI
0707
Secret sharing scheme; Visual secret sharing; Visual cryptography;
Computation complexity; Pixel expansion
BibRef
Yang, C.N.[Ching-Nung],
Yu, K.H.[Kun-Hsuan],
Lukac, R.[Rastislav],
User-friendly image sharing using polynomials with different primes,
IJIST(17), No. 1, 2007, pp. 40-47.
DOI Link
0707
BibRef
Lin, S.J.[Sian-Jheng],
Lin, J.C.[Ja-Chen],
VCPSS: A two-in-one two-decoding-options image sharing method combining
visual cryptography (VC) and polynomial-style sharing (PSS) approaches,
PR(40), No. 12, December 2007, pp. 3652-3666.
Elsevier DOI
0709
Hiding using block-types; Image sharing; (t,n) threshold scheme;
Halftone version; Compression
BibRef
Shyu, S.J.[Shyong Jian],
Huang, S.Y.[Shih-Yu],
Lee, Y.K.[Yeuan-Kuen],
Wang, R.Z.[Ran-Zan],
Chen, K.[Kun],
Sharing multiple secrets in visual cryptography,
PR(40), No. 12, December 2007, pp. 3633-3651.
Elsevier DOI
0709
Secret sharing; Visual cryptography; Visual multi-secret sharing
BibRef
Fang, W.P.[Wen-Pinn],
Friendly progressive visual secret sharing,
PR(41), No. 4, April 2008, pp. 1410-1414.
Elsevier DOI
0801
Visual cryptography; Progress; Secret sharing; Friendly
BibRef
Li, S.,
Li, C.,
Lo, K.T.,
Chen, G.,
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion,
CirSysVideo(18), No. 3, March 2008, pp. 338-349.
IEEE DOI
0804
BibRef
Tong, X.J.[Xiao-Jun],
Cui, M.G.[Ming-Gen],
Image encryption with compound chaotic sequence cipher shifting
dynamically,
IVC(26), No. 6, 1 June 2008, pp. 843-850.
Elsevier DOI
0804
Compound chaos; Stream cipher; Image encryption
BibRef
Lin, Q.H.[Qiu-Hua],
Yin, F.L.[Fu-Liang],
Mei, T.M.[Tie-Min],
Liang, H.L.[Hua-Lou],
A blind source separation-based method for multiple images encryption,
IVC(26), No. 6, 1 June 2008, pp. 788-798.
Elsevier DOI
0804
Blind source separation; Independent component analysis; Image encryption
BibRef
Yang, C.N.[Ching-Nung],
Chen, T.S.[Tse-Shih],
Colored visual cryptography scheme based on additive color mixing,
PR(41), No. 10, October 2008, pp. 3114-3129.
Elsevier DOI
0808
Visual cryptography; Visual secret sharing; Colored visual cryptography;
Additive color mixing
BibRef
Naughton, T.J.[Thomas J.],
Hennelly, B.M.[Bryan M.],
Dowling, T.[Tom],
Introducing secure modes of operation for optical encryption,
JOSA-A(25), No. 10, October 2008, pp. 2608-2617.
WWW Link.
0810
BibRef
Leung, B.W.[Bert W.],
Ng, F.Y.[Felix Y.],
Wong, D.S.[Duncan S.],
On the security of a visual cryptography scheme for color images,
PR(42), No. 5, May 2009, pp. 929-940.
Elsevier DOI
0902
Visual cryptography; Dithering technology; Color decomposition; Secret
sharing; Cryptanalysis
BibRef
Li, C.Q.[Cheng-Qing],
Li, S.J.[Shu-Jun],
Asim, M.[Muhammad],
Nunez, J.[Juana],
Alvarez, G.[Gonzalo],
Chen, G.R.[Guan-Rong],
On the security defects of an image encryption scheme,
IVC(27), No. 9, 3 August 2009, pp. 1371-1381.
Elsevier DOI
0906
Cryptanalysis; Image encryption; Chaos; Known-plaintext attack;
Chosen-plaintext attack
BibRef
Li, C.Q.[Cheng-Qing],
Li, S.J.[Shu-Jun],
Chen, G.R.[Guan-Rong],
Halang, W.A.[Wolfgang A.],
Cryptanalysis of an image encryption scheme based on a compound chaotic
sequence,
IVC(27), No. 8, 2 July 2009, pp. 1035-1039.
Elsevier DOI
0906
Cryptanalysis; Image encryption; Chaos; Differential chosen-plaintext
attack; Randomness test
BibRef
Wang, D.S.[Dao-Shun],
Yi, F.[Feng],
Li, X.B.[Xiao-Bo],
On general construction for extended visual cryptography schemes,
PR(42), No. 11, November 2009, pp. 3071-3082.
Elsevier DOI
0907
Visual cryptography; Secret sharing scheme; Multi-secret images
BibRef
Ye, G.D.[Guo-Dong],
Image scrambling encryption algorithm of pixel bit based on chaos map,
PRL(31), No. 5, 1 April 2010, pp. 347-354.
Elsevier DOI
1002
Image scrambling encryption; Chaos map; Gray scrambling; Position
permutation; Pixel bit
BibRef
Liu, W.,
Zeng, W.,
Dong, L.,
Yao, Q.,
Efficient Compression of Encrypted Grayscale Images,
IP(19), No. 4, April 2010, pp. 1097-1102.
IEEE DOI
1003
BibRef
Kang, I.,
Arce, G.R.,
Lee, H.K.,
Color Extended Visual Cryptography Using Error Diffusion,
IP(20), No. 1, January 2011, pp. 132-145.
IEEE DOI
1101
BibRef
Hou, Y.C.,
Quan, Z.Y.,
Progressive Visual Cryptography With Unexpanded Shares,
CirSysVideo(21), No. 11, November 2011, pp. 1760-1764.
IEEE DOI
1111
BibRef
Wang, R.Z.[Ran-Zan],
Hsu, S.F.[Shuo-Fang],
Tagged Visual Cryptography,
SPLetters(18), No. 11, November 2011, pp. 627-630.
IEEE DOI
1112
BibRef
Liu, F.[Feng],
Guo, T.[Teng],
Wu, C.K.[Chuan-Kun],
Qian, L.[Lina],
Improving the visual quality of size invariant visual cryptography
scheme,
JVCIR(23), No. 2, February 2012, pp. 331-342.
Elsevier DOI
1201
Visual cryptography; Visual quality; Size invariant; Secret sharing;
Thin line problem; Variance; Multi-pixel encryption; Probabilistic
visual cryptography scheme
BibRef
François, M.,
Grosges, T.,
Barchiesi, D.,
Erra, R.,
A new image encryption scheme based on a chaotic function,
SP:IC(27), No. 3, March 2012, pp. 249-259.
Elsevier DOI
1203
Image encryption; Chaotic function; Statistical analysis; Confusion;
Diffusion; Indistinguishability
BibRef
Imaizumi, S.[Shoko],
Kiya, H.[Hitoshi],
A Block-Permutation-Based Encryption Scheme with Independent Processing
of RGB Components,
IEICE(E101-D), No. 12, December 2018, pp. 3150-3157.
WWW Link.
1812
BibRef
Imaizumi, S.[Shoko],
Ogasawara, T.[Takeshi],
Kiya, H.[Hitoshi],
Block-Permutation-Based Encryption Scheme with Enhanced Color
Scrambling,
SCIA17(I: 562-573).
Springer DOI
1706
BibRef
Shyu, S.J.,
Jiang, H.W.,
Efficient Construction for Region Incrementing Visual Cryptography,
CirSysVideo(22), No. 5, May 2012, pp. 769-777.
IEEE DOI
1202
BibRef
Yang, C.N.,
Shih, H.W.,
Wu, C.C.,
Harn, L.,
k Out of n Region Incrementing Scheme in Visual Cryptography,
CirSysVideo(22), No. 5, May 2012, pp. 799-810.
IEEE DOI
1202
BibRef
Yang, C.N.[Ching-Nung],
Wu, C.C.[Chih-Cheng],
Lin, Y.C.[Yi-Chin],
k Out of n Region-Based Progressive Visual Cryptography,
CirSysVideo(29), No. 1, January 2019, pp. 252-262.
IEEE DOI
1901
BibRef
Earlier: A1, A3, A2:
Cheating Immune Block-Based Progressive Visual Cryptography,
IWDW13(95-108).
Springer DOI
1407
Visualization, Cryptography, Image color analysis,
Image reconstruction, Stacking, Decoding, Visual secret sharing,
progressive decoding
BibRef
Win, L.L.,
Thomas, T.,
Emmanuel, S.,
Privacy Enabled Digital Rights Management Without Trusted Third Party
Assumption,
MultMed(14), No. 3, 2012, pp. 546-554.
IEEE DOI
1202
BibRef
Chen, Y.C.,
Horng, G.,
Tsai, D.S.,
Comment on 'Cheating Prevention in Visual Cryptography',
IP(21), No. 7, July 2012, pp. 3319-3323.
IEEE DOI
1206
See also Cheating Prevention in Visual Cryptography.
BibRef
Dalhoum, A.L.A.[Abdel Latif Abu],
Mahafzah, B.A.[Basel A.],
Awwad, A.A.[Aiman Ayyal],
Aldhamari, I.[Ibraheem],
Ortega, A.[Alfonso],
Alfonseca, M.[Manuel],
Digital Image Scrambling Using 2D Cellular Automata,
MultMedMag(19), No. 4, 2012, pp. 28-36.
IEEE DOI
1210
based on game of life.
BibRef
Lin, H.C.[Hsiao-Ching],
Yang, C.N.[Ching-Nung],
Laih, C.S.[Chi-Sung],
Lin, H.T.[Hui-Tang],
Natural language letter based visual cryptography scheme,
JVCIR(24), No. 3, April 2013, pp. 318-331.
Elsevier DOI
1303
Deterministic VCS; Letter-based; Natural language; Probabilistic VCS;
Secret sharing; Subpixel; Visual cryptography scheme; Visual secret
sharing
BibRef
Zhang, Y.S.[Yu-Shu],
Xiao, D.[Di],
Shu, Y.[Yonglu],
Li, J.[Jing],
A novel image encryption scheme based on a linear hyperbolic chaotic
system of partial differential equations,
SP:IC(28), No. 3, March 2013, pp. 292-300.
Elsevier DOI
1303
Hyperbolic chaotic systems; Partial differential equations; Image
encryption; Coupled map lattices; Time-varying delay
BibRef
Zhu, H.[Hegui],
Zhao, C.[Cheng],
Zhang, X.D.[Xiang-De],
A novel image encryption-compression scheme using hyper-chaos and
Chinese remainder theorem,
SP:IC(28), No. 6, July 2013, pp. 670-680.
Elsevier DOI
1306
Hyper-chaos; Image encryption; Image compression; Compression
ratio; Chinese remainder theorem
BibRef
Azzaz, M.S.,
Tanougast, C.,
Sadoudi, S.,
Dandache, A.,
Robust chaotic key stream generator for real-time images encryption,
RealTimeIP(8), No. 3, September 2013, pp. 297-306.
WWW Link.
1309
BibRef
Lima, J.B.,
Lima, E.A.O.,
Madeiro, F.,
Image encryption based on the finite field cosine transform,
SP:IC(28), No. 10, 2013, pp. 1537-1547.
Elsevier DOI
1312
Image encryption
BibRef
Lima, J.B.,
da Silva, E.S.,
Campello de Souza, R.M.,
Cosine transforms over fields of characteristic 2: Fast computation
and application to image encryption,
SP:IC(54), No. 1, 2017, pp. 130-139.
Elsevier DOI
1704
Finite field cosine transform
BibRef
Lima, J.B.,
Madeiro, F.,
Sales, F.J.R.,
Encryption of medical images based on the cosine number transform,
SP:IC(35), No. 1, 2015, pp. 1-8.
Elsevier DOI
1506
Medical images
BibRef
Liu, Y.[Yang],
Tong, X.J.[Xiao-Jun],
Hu, S.[Shicheng],
A family of new complex number chaotic maps based image encryption
algorithm,
SP:IC(28), No. 10, 2013, pp. 1548-1559.
Elsevier DOI
1312
Image encryption
BibRef
Li, P.[Peng],
Yang, C.N.[Ching-Nung],
Kong, Q.[Qian],
Ma, Y.P.[Yan-Peng],
Liu, Z.[Zheng],
Sharing more information in gray visual cryptography scheme,
JVCIR(24), No. 8, 2013, pp. 1380-1393.
Elsevier DOI
1312
Visual cryptography
BibRef
Yang, C.N.[Ching-Nung],
Wang, D.S.[Dao-Shun],
Property Analysis of XOR-Based Visual Cryptography,
CirSysVideo(24), No. 2, February 2014, pp. 189-197.
IEEE DOI
1403
cryptography
BibRef
Barakat, M.L.,
Mansingka, A.S.,
Radwan, A.G.,
Salama, K.N.,
Hardware stream cipher with controllable chaos generator for colour
image encryption,
IET-IPR(8), No. 1, January 2014, pp. 33-43.
DOI Link
1403
cryptography
BibRef
Pande, A.,
Mohapatra, P.,
Zambreno, J.,
Securing Multimedia Content Using Joint Compression and Encryption,
MultMedMag(20), No. 4, October 2013, pp. 50-61.
IEEE DOI
1403
Internet
BibRef
Caragata, D.[Daniel],
Tutanescu, I.[Ion],
On the security of a new image encryption scheme based on a chaotic
function,
SIViP(8), No. 4, May 2014, pp. 641-646.
WWW Link.
1404
BibRef
Wang, X.,
Pei, Q.,
Li, H.,
A Lossless Tagged Visual Cryptography Scheme,
SPLetters(21), No. 7, July 2014, pp. 853-856.
IEEE DOI
1405
Cryptography
BibRef
Ghebleh, M.,
Kanso, A.,
Noura, H.,
An image encryption scheme based on irregularly decimated chaotic
maps,
SP:IC(29), No. 5, 2014, pp. 618-627.
Elsevier DOI
1406
Chaos
BibRef
Dong, C.[Chang'e],
Color image encryption using one-time keys and coupled chaotic
systems,
SP:IC(29), No. 5, 2014, pp. 628-640.
Elsevier DOI
1406
Color image encryption
BibRef
Czaplewski, B.[Bartosz],
Dzwonkowski, M.[Mariusz],
Rykaczewski, R.[Roman],
Digital fingerprinting for color images based on the quaternion
encryption scheme,
PRL(46), No. 1, 2014, pp. 11-19.
Elsevier DOI
1407
Cryptography
BibRef
Czaplewski, B.[Bartosz],
Joint fingerprinting and decryption method for color images based on
quaternion rotation with cipher quaternion chaining,
JVCIR(40, Part A), No. 1, 2016, pp. 1-13.
Elsevier DOI
1609
Fingerprinting
BibRef
Zhang, X.P.[Xuan-Ping],
Zhao, Z.M.[Zhong-Meng],
Wang, J.Y.[Jia-Yin],
Chaotic image encryption based on circular substitution box and key
stream buffer,
SP:IC(29), No. 8, 2014, pp. 902-913.
Elsevier DOI
1410
Image encryption
BibRef
Boriga, R.[Radu],
Dascalescu, A.C.[Ana Cristina],
Priescu, I.[Iustin],
A new hyperchaotic map and its application in an image encryption
scheme,
SP:IC(29), No. 8, 2014, pp. 887-901.
Elsevier DOI
1410
Hyperchaos
BibRef
Li, C.Q.[Cheng-Qing],
Liu, Y.S.[Yuan-Sheng],
Zhang, L.Y.[Leo Yu],
Wong, K.W.[Kwok-Wo],
Cryptanalyzing a class of image encryption schemes based on Chinese
remainder theorem,
SP:IC(29), No. 8, 2014, pp. 914-920.
Elsevier DOI
1410
Compression
BibRef
Bhatnagar, G.,
Wu, Q.M.J.,
Biometric Inspired Multimedia Encryption Based on Dual Parameter
Fractional Fourier Transform,
SMCS(44), No. 9, September 2014, pp. 1234-1247.
IEEE DOI
1410
Fourier transforms
BibRef
Ziyabar, H.M.[Hashem Moradmand],
Sinaie, M.[Mahnaz],
Payandeh, A.[Ali],
Payandeh, A.[Ali],
Vakili, V.T.[Vahid Tabataba],
Secure FSM-based arithmetic codes,
SIViP(8), No. 7, October 2014, pp. 1263-1272.
Springer DOI
1410
atithmetic coding for compression and secrecy.
BibRef
Masmoudi, A.,
Puech, W.,
Lossless chaos-based crypto-compression scheme for image protection,
IET-IPR(8), No. 12, 2014, pp. 671-686.
DOI Link
1412
chaos
BibRef
Abd-El-Hafiz, S.K.,
Radwan, A.G.,
Haleem, S.H.A.[S.H. Abdel],
Barakat, M.L.,
A fractal-based image encryption system,
IET-IPR(8), No. 12, 2014, pp. 742-752.
DOI Link
1412
cryptography
BibRef
Bai, X.[Xiao],
Yang, H.[Haichuan],
Zhou, J.[Jun],
Ren, P.[Peng],
Cheng, J.[Jian],
Data-Dependent Hashing Based on p-Stable Distribution,
IP(23), No. 12, December 2014, pp. 5033-5046.
IEEE DOI
1412
cryptography
BibRef
Elhoseny, H.M.[Heba M.],
Ahmed, H.E.H.[Hossam E. H.],
Abbas, A.M.[Alaa M.],
Kazemian, H.B.[Hassan B.],
Faragallah, O.S.[Osama S.],
El-Rabaie, E.S.M.[El-Sayed M.],
El-Samie, F.E.A.[Fathi E. Abd],
Chaotic encryption of images in the fractional Fourier transform domain
using different modes of operation,
SIViP(9), No. 3, March 2015, pp. 611-622.
Springer DOI
1503
BibRef
Faragallah, O.S.[Osama S.],
Efficient confusion-diffusion chaotic image cryptosystem using enhanced
standard map,
SIViP(9), No. 8, November 2015, pp. 1917-1926.
WWW Link.
1511
BibRef
Ullagaddi, V.[Vishwanath],
Hassan, F.[Firas],
Devabhaktuni, V.[Vijay],
Symmetric synchronous stream encryption using images,
SIViP(9), No. 1, January 2015, pp. 1-8.
Springer DOI
1503
Use bit plane from an image for encryption of stream.
(Not encrypt an image.)
BibRef
Sun, Y.Y.[Yuan-Yuan],
Xu, R.[Rudan],
Chen, L.[Lina],
Hu, X.P.[Xiao-Peng],
Image compression and encryption scheme using fractal dictionary and
Julia set,
IET-IPR(9), No. 3, 2015, pp. 173-183.
DOI Link
1504
cryptography
BibRef
Jeng, F.G.[Fuh-Gwo],
Huang, W.L.[Wei-Lun],
Chen, T.H.[Tzung-Her],
Cryptanalysis and improvement of two hyper-chaos-based image
encryption schemes,
SP:IC(34), No. 1, 2015, pp. 45-51.
Elsevier DOI
1505
Cryptanalysis
BibRef
Wadi, S.M.,
Zainal, N.,
Decomposition by binary codes-based speedy image encryption algorithm
for multiple applications,
IET-IPR(9), No. 5, 2015, pp. 413-423.
DOI Link
1506
binary codes
BibRef
Nini, B.,
Lemmouchi, C.,
Security analysis of a three-dimensional rotation-based image
encryption,
IET-IPR(9), No. 8, 2015, pp. 680-689.
DOI Link
1506
cryptography
BibRef
Shyu, S.J.,
Chen, M.C.,
Minimizing Pixel Expansion in Visual Cryptographic Scheme for General
Access Structures,
CirSysVideo(25), No. 9, September 2015, pp. 1557-1561.
IEEE DOI
1509
Cryptography
BibRef
Daneshgar, A.[Amir],
Khadem, B.[Behrooz],
A self-synchronized chaotic image encryption scheme,
SP:IC(36), No. 1, 2015, pp. 106-114.
Elsevier DOI
1509
Chaos
BibRef
Dzwonkowski, M.,
Papaj, M.,
Rykaczewski, R.,
A New Quaternion-Based Encryption Method for DICOM Images,
IP(24), No. 11, November 2015, pp. 4614-4622.
IEEE DOI
1509
DICOM
BibRef
Yang, C.N.[Ching-Nung],
Wu, C.C.[Chih-Cheng],
Lin, Y.C.[Yi-Chin],
Kim, C.[Cheonshik],
Constructions and Properties of General (k, n) Block-Based Progressive
Visual Cryptography,
ETRI(37), No. 5, October 2015, pp. 979-989.
DOI Link
1511
BibRef
Tong, X.J.[Xiao-Jun],
Zhang, M.[Miao],
Wang, Z.[Zhu],
Liu, Y.[Yang],
Xu, H.[Hui],
Ma, J.[Jing],
A fast encryption algorithm of color image based on four-dimensional
chaotic system,
JVCIR(33), No. 1, 2015, pp. 219-234.
Elsevier DOI
1512
Image encryption
BibRef
Bechikh, R.[Rabei],
Hermassi, H.[Houcemeddine],
El-Latif, A.A.A.[Ahmed A. Abd],
Rhouma, R.[Rhouma],
Belghith, S.[Safya],
Breaking an image encryption scheme based on a spatiotemporal chaotic
system,
SP:IC(39, Part A), No. 1, 2015, pp. 151-158.
Elsevier DOI
1512
Cryptanalysis
BibRef
Zhang, Y.S.[Yu-Shu],
Wong, K.W.[Kwok-Wo],
Zhang, L.Y.[Leo Yu],
Wen, W.Y.[Wen-Ying],
Zhou, J.T.[Jian-Tao],
He, X.[Xing],
Robust coding of encrypted images via structural matrix,
SP:IC(39, Part A), No. 1, 2015, pp. 202-211.
Elsevier DOI
1512
Multiple description code
BibRef
Islam, N.[Naveed],
Shahid, Z.[Zafar],
Puech, W.[William],
Denoising and error correction in noisy AES-encrypted images using
statistical measures,
SP:IC(41), No. 1, 2016, pp. 15-27.
Elsevier DOI
1602
BibRef
And: A1, A3, Only:
Decryption of noisy encrypted images by statistical analysis,
EUVIP11(192-198).
IEEE DOI
1110
Cryptosystem.
BibRef
El Assad, S.[Safwan],
Farajallah, M.[Mousa],
A new chaos-based image encryption system,
SP:IC(41), No. 1, 2016, pp. 144-157.
Elsevier DOI
1602
Chaos-based cryptosystem
BibRef
Fawaz, Z.[Zeinab],
Noura, H.[Hassan],
Mostefaoui, A.[Ahmed],
An efficient and secure cipher scheme for images confidentiality
preservation,
SP:IC(42), No. 1, 2016, pp. 90-108.
Elsevier DOI
1603
Security
BibRef
Ye, G.,
Huang, X.,
An Image Encryption Algorithm Based on Autoblocking and
Electrocardiography,
MultMedMag(23), No. 2, April 2016, pp. 64-71.
IEEE DOI
1605
Algorithm design and analysis
BibRef
Chen, C.C.[Chien-Chang],
Chen, S.C.[Shih-Chang],
Two-layered structure for optimally essential secret image sharing
scheme,
JVCIR(38), No. 1, 2016, pp. 595-601.
Elsevier DOI
1605
Secret image sharing
BibRef
Chen, C.C.[Chien-Chang],
Essential secret image sharing scheme with equal-sized shadows
generation,
JVCIR(52), 2018, pp. 143 - 150.
Elsevier DOI
1804
Secret image sharing, Essential, Non-essential, Three-layered structure
BibRef
Yang, C.N.[Ching-Nung],
Sun, L.Z.[Li-Zhe],
Yan, X.[Xuehu],
Kim, C.[Cheonshik],
Design a new visual cryptography for human-verifiable authentication in
accessing a database,
RealTimeIP(12), No. 2, August 2016, pp. 483-494.
Springer DOI
1608
BibRef
Karabina, K.[Koray],
Canpolat, O.[Onur],
A new cryptographic primitive for noise tolerant template security,
PRL(80), No. 1, 2016, pp. 70-75.
Elsevier DOI
1609
Template security
BibRef
Yap, W.S.[Wun-She],
Phan, R.C.W.[Raphael C.W.],
Goi, B.M.[Bok-Min],
Yau, W.C.[Wei-Chuen],
Heng, S.H.[Swee-Huay],
On the effective subkey space of some image encryption algorithms
using external key,
JVCIR(40, Part A), No. 1, 2016, pp. 51-57.
Elsevier DOI
1609
Image encryption
BibRef
Murugan, B.,
Gounder, A.G.N.[A. G. Nanjappa],
Image encryption scheme based on block-based confusion and multiple
levels of diffusion,
IET-CV(10), No. 6, 2016, pp. 593-602.
DOI Link
1609
cryptography
BibRef
Abanda, Y.,
Tiedeu, A.,
Image encryption by chaos mixing,
IET-IPR(10), No. 10, 2016, pp. 742-750.
DOI Link
1610
chaos
BibRef
Shao, Z.H.[Zhu-Hong],
Shang, Y.Y.[Yuan-Yuan],
Zeng, R.[Rui],
Shu, H.Z.[Hua-Zhong],
Coatrieux, G.[Gouenou],
Wu, J.S.[Jia-Song],
Robust watermarking scheme for color image based on quaternion-type
moment invariants and visual cryptography,
SP:IC(48), No. 1, 2016, pp. 12-21.
Elsevier DOI
1609
Color image
BibRef
Wang, Y.F.[Yun-Fei],
Shang, Y.Y.[Yuan-Yuan],
Shao, Z.H.[Zhu-Hong],
Zhang, Y.[Yan],
Coatrieux, G.[Gouenou],
Ding, H.[Hui],
Liu, T.[Tie],
Multiple color image encryption based on cascaded quaternion gyrator
transforms,
SP:IC(107), 2022, pp. 116793.
Elsevier DOI
2208
Multiple color image encryption,
Cascaded encryption structure, Quaternion gyrator transform
BibRef
Shao, Z.H.[Zhu-Hong],
Wu, J.S.[Jia-Song],
Coatrieux, J.L.[Jean Louis],
Coatrieux, G.[Gouenou],
Shu, H.Z.[Hua-Zhong],
Quaternion gyrator transform and its application to color image
encryption,
ICIP13(4579-4582)
IEEE DOI
1402
Quaternion gyrator transform; color image; encryption
BibRef
Annaby, M.H.,
Rushdi, M.A.,
Nehary, E.A.,
Image encryption via discrete fractional Fourier-type transforms
generated by random matrices,
SP:IC(49), No. 1, 2016, pp. 25-46.
Elsevier DOI
1609
Discrete fractional Fourier transform
BibRef
Yuan, H.M.[Hong-Mei],
Liu, Y.[Ye],
Lin, T.[Tao],
Hu, T.[Ting],
Gong, L.H.[Li-Hua],
A new parallel image cryptosystem based on 5D hyper-chaotic system,
SP:IC(52), No. 1, 2017, pp. 87-96.
Elsevier DOI
1701
Parallel image cryptosystem
BibRef
Chai, X.L.[Xiu-Li],
Gan, Z.H.[Zhi-Hua],
Yang, K.[Kang],
Chen, Y.R.[Yi-Ran],
Liu, X.X.[Xian-Xing],
An image encryption algorithm based on the memristive hyperchaotic
system, cellular automata and DNA sequence operations,
SP:IC(52), No. 1, 2017, pp. 6-19.
Elsevier DOI
1701
Image encryption
BibRef
Yang, C.N.[Ching-Nung],
Liao, J.K.[Jung-Kuo],
Wang, D.S.[Dao-Shun],
New privilege-based visual cryptography with arbitrary privilege
levels,
JVCIR(42), No. 1, 2017, pp. 121-131.
Elsevier DOI
1701
Visual cryptography
BibRef
Cao, X.W.[Xing-Wu],
Wei, X.X.[Xing-Xing],
Guo, R.[Rui],
Wang, C.C.[Chang-Chun],
No embedding: A novel image cryptosystem for meaningful encryption,
JVCIR(44), No. 1, 2017, pp. 236-249.
Elsevier DOI
1703
Image encryption
BibRef
Huang, H.Q.[Hui-Qing],
Yang, S.Z.[Shou-Zhi],
Colour image encryption based on logistic mapping and double
random-phase encoding,
IET-IPR(11), No. 4, April 2017, pp. 211-216.
DOI Link
1704
BibRef
Özkaynak, F.[Fatih],
Çelik, V.[Vedat],
Özer, A.B.[Ahmet Bedri],
A new S-box construction method based on the fractional-order chaotic
Chen system,
SIViP(11), No. 4, May 2017, pp. 659-664.
WWW Link.
1704
substitution box, block encryption algorithms.
BibRef
Liu, H.J.[Hong-Jun],
Kadir, A.[Abdurahman],
Sun, X.B.[Xiao-Bo],
Chaos-based fast colour image encryption scheme with true random number
keys from environmental noise,
IET-IPR(11), No. 5, April 2017, pp. 324-332.
DOI Link
1706
BibRef
Herbadji, D.[Djamel],
Belmeguenai, A.[Aissa],
Derouiche, N.[Nadir],
Liu, H.J.[Hong-Jung],
Colour image encryption scheme based on enhanced quadratic chaotic map,
IET-IPR(14), No. 1, January 2020, pp. 40-52.
DOI Link
1912
BibRef
Li, C.,
Lin, D.,
Lü, J.,
Cryptanalyzing an Image-Scrambling Encryption Algorithm of Pixel Bits,
MultMedMag(24), No. 3, 2017, pp. 64-71.
IEEE DOI
1708
Algorithm design and analysis, Ciphers, Cryptography, Encryption,
Image processing, Mathematical model, Multimedia communication,
Visualization, ciphertext-only attack, cryptanalysis, cryptography,
graphics, image encryption, known-plaintext attack, multimedia,
security, template, matching
BibRef
Yang, C.N.[Ching-Nung],
Wu, X.T.[Xiao-Tian],
Chou, Y.C.[Yung-Chien],
Fu, Z.J.[Zhang-Jie],
Constructions of general reversible AMBTC-based visual cryptography
with two decryption options,
JVCIR(48), No. 1, 2017, pp. 182-194.
Elsevier DOI
1708
Visual, cryptography
BibRef
Bao, L.,
Yi, S.,
Zhou, Y.,
Combination of Sharing Matrix and Image Encryption for Lossless
(k,n)-Secret Image Sharing,
IP(26), No. 12, December 2017, pp. 5618-5631.
IEEE DOI
1710
cryptography, image reconstruction,
sharing matrix, Algorithm design and analysis, Distortion,
BibRef
Nosrati, K.[Komeil],
Volos, C.[Christos],
Azemi, A.[Asad],
Cubature Kalman filter-based chaotic synchronization and image
encryption,
SP:IC(58), No. 1, 2017, pp. 35-48.
Elsevier DOI
1710
Chaos, synchronization
BibRef
Boussif, M.[Mohamed],
Aloui, N.[Noureddine],
Cherif, A.[Adnane],
Smartphone application for medical images secured exchange based on
encryption using the matrix product and the exclusive addition,
IET-IPR(11), No. 11, November 2017, pp. 1020-1026.
DOI Link
1711
BibRef
Askar, S.S.[Sameh S.],
Karawia, A.A.[Abdelrahman A.],
Alammar, F.S.[Fatmah S.],
Cryptographic algorithm based on pixel shuffling and dynamical chaotic
economic map,
IET-IPR(12), No. 1, January 2018, pp. 158-167.
DOI Link
1712
BibRef
And:
Erratum:
IET-IPR(12), No. 1, January 2018, pp. 168-168.
DOI Link
1712
BibRef
Cho, W.,
Yu, N.Y.,
Secure Communications With Asymptotically Gaussian Compressed
Encryption,
SPLetters(25), No. 1, January 2018, pp. 80-84.
IEEE DOI
1801
Gaussian processes, cryptography, telecommunication security,
wireless channels, Hellinger distance, TV distance,
total variation (TV) distance
BibRef
Li, M.[Ming],
Guo, Y.Z.[Yu-Zhu],
Huang, J.[Jie],
Li, Y.[Yang],
Cryptanalysis of a chaotic image encryption scheme based on
permutation-diffusion structure,
SP:IC(62), 2018, pp. 164-172.
Elsevier DOI
1802
Cryptanalysis, Permutation-diffusion structure,
Image encryption, Chaos, Chosen plaintext attack
BibRef
Wang, C.T.[Chun-Tao],
Xiao, D.Q.[De-Qing],
Peng, H.X.[Hong-Xing],
Zhang, R.Y.[Rong-Yue],
A lossy compression scheme for encrypted images exploiting Cauchy
distribution and weighted rate distortion optimization,
JVCIR(51), 2018, pp. 122-130.
Elsevier DOI
1802
Compression of encrypted signals, Statistical model,
Rate-distortion optimization, Lifting wavelet
BibRef
Jia, X.,
Wang, D.,
Nie, D.,
Zhang, C.,
Collaborative Visual Cryptography Schemes,
CirSysVideo(28), No. 5, May 2018, pp. 1056-1070.
IEEE DOI
1805
Collaboration, Cryptography, Image reconstruction,
Information security, Integer linear programming, Visualization,
visual cryptography (VC) scheme
BibRef
Kaur, M.[Manjit],
Kumar, V.[Vijay],
Colour image encryption technique using differential evolution in
non-subsampled contourlet transform domain,
IET-IPR(12), No. 7, July 2018, pp. 1273-1283.
DOI Link
1806
BibRef
Reddy, M.P.[M. Purushotham],
Reddy, B.V.R.[B. Venkata Ramana],
Bindu, C.S.[C. Shoba],
An image encryption algorithm using logarithmic function and
Henon-chaotic function,
IJCVR(8), No. 4, 2018, pp. 388-402.
DOI Link
1808
BibRef
Yang, C.N.[Ching-Nung],
Wu, F.H.[Fu-Heng],
Peng, S.L.[Sheng-Lung],
Enhancing multi-factor cheating prevention in visual cryptography
based minimum (k, n)-connected graph,
JVCIR(55), 2018, pp. 660-676.
Elsevier DOI
1809
Visual cryptography, Cheating attack, Cheating prevention,
Verification image, Shadow image
BibRef
Montesinos-García, J.J.[Juan J.],
Martinez-Guerra, R.[Rafael],
Colour image encryption via fractional chaotic state estimation,
IET-IPR(12), No. 10, October 2018, pp. 1913-1920.
DOI Link
1809
BibRef
Dzwonkowski, M.,
Rykaczewski, R.,
Secure Quaternion Feistel Cipher for DICOM Images,
IP(28), No. 1, January 2019, pp. 371-380.
IEEE DOI
1810
Quaternions, Encryption, DICOM, Ciphers,
Cryptography, medical data, quaternion rotation, lossless scheme,
Julia sets
BibRef
Singh, H.[Hukum],
Watermarking image encryption using deterministic phase mask and
singular value decomposition in fractional Mellin transform domain,
IET-IPR(12), No. 11, November 2018, pp. 1994-2001.
DOI Link
1810
BibRef
Yan, B.,
Xiang, Y.,
Hua, G.,
Improving the Visual Quality of Size-Invariant Visual Cryptography
for Grayscale Images: An Analysis-by-Synthesis (AbS) Approach,
IP(28), No. 2, February 2019, pp. 896-911.
IEEE DOI
1811
Gray-scale, Visualization, Cryptography, Stacking,
Image reconstruction, Measurement,
vector visual cryptography
BibRef
Lobachev, O.[Oleg],
Direct visualization of cryptographic keys for enhanced security,
VC(34), No. 12, December 2018, pp. 1749-1759.
WWW Link.
1811
BibRef
Sharma, H.[Himani],
Mishra, D.C.,
Sharma, R.K.,
Kumar, N.[Naveen],
Crypto-stego System for Securing Text and Image Data,
IJIG(18), No. 4 2018, pp. 1850020.
DOI Link
1812
BibRef
Li, R.Z.[Ren-Zhi],
Liu, Q.[Qian],
Liu, L.F.[Ling-Feng],
Novel image encryption algorithm based on improved logistic map,
IET-IPR(13), No. 1, January 2019, pp. 125-134.
DOI Link
1812
BibRef
Chen, B.J.[Bei-Jing],
Yu, M.[Ming],
Tian, Y.H.[Yu-Hang],
Li, L.[Leida],
Wang, D.C.[Ding-Cheng],
Sun, X.M.[Xing-Ming],
Multiple-parameter fractional quaternion Fourier transform and its
application in colour image encryption,
IET-IPR(12), No. 12, December 2018, pp. 2238-2249.
DOI Link
1812
BibRef
Su, Y.R.[Ying-Ri],
Wo, Y.[Yan],
Han, G.Q.[Guo-Qiang],
Reversible cellular automata image encryption for similarity search,
SP:IC(72), 2019, pp. 134-147.
Elsevier DOI
1902
Image encryption, Image similarity search, Multi-granularity,
Reversible cellular automata
BibRef
Wu, X.T.[Xiao-Tian],
Chen, D.[Dong],
Yang, C.N.[Ching-Nung],
Yang, Y.Y.[Yi-Yun],
A (k,n) threshold partial reversible AMBTC-based visual cryptography
using one reference image,
JVCIR(59), 2019, pp. 550-562.
Elsevier DOI
1903
Visual cryptography, Block truncation coding,
Partial reversible, Meaningful share, Contrast, Reference image
BibRef
Gondim, M.A.A.[Marcos A.A.],
de Oliveira Neto, J.R.[José R.],
Lima, J.B.[Juliano B.],
Steerable Fourier number transform with application to image
encryption,
SP:IC(74), 2019, pp. 89-95.
Elsevier DOI
1904
Number-theoretic transforms, Steerable transforms,
Graph signal processing, Image encryption
BibRef
de Oliveira Neto, J.R.[José R.],
Lima, J.B.[Juliano B.],
Panario, D.,
The Design of a Novel Multiple-Parameter Fractional Number-Theoretic
Transform and Its Application to Image Encryption,
CirSysVideo(30), No. 8, August 2020, pp. 2489-2502.
IEEE DOI
2008
Encryption, Eigenvalues and eigenfunctions, Cats,
Discrete Fourier transforms, Systematics,
image encryption
BibRef
Cao, H.,
Lin, S.,
Zhang, W.,
Han, Y.S.,
On the Security of Secret Sharing Over a Ring and the Fast
Implementation,
SPLetters(26), No. 5, May 2019, pp. 705-709.
IEEE DOI
1905
computational complexity, cryptography, fast Fourier transforms,
polynomials, polynomial secret sharing, secret sharing scheme,
fast fourier transform
BibRef
Li, F.Y.[Feng-Yong],
Wu, H.B.[Hai-Bin],
Zhou, G.[Gang],
Wei, W.M.[Wei-Min],
Robust real-time image encryption with aperiodic chaotic map and
random-cycling bit shift,
RealTimeIP(16), No. 3, June 2019, pp. 775-790.
WWW Link.
1906
BibRef
Kang, X.,
Ming, A.,
Tao, R.,
Reality-Preserving Multiple Parameter Discrete Fractional Angular
Transform and Its Application to Color Image Encryption,
CirSysVideo(29), No. 6, June 2019, pp. 1595-1607.
IEEE DOI
1906
Transforms, Encryption, Color, Image color analysis, Indexes,
Chaotic communication, Fractional angular transform,
reality preserving
BibRef
Guan, M.M.[Meng-Meng],
Yang, X.L.[Xue-Lin],
Hu, W.S.[Wei-Sheng],
Chaotic image encryption algorithm using frequency-domain DNA encoding,
IET-IPR(13), No. 9, 18 July 2019, pp. 1535-1539.
DOI Link
1907
BibRef
Kang, X.,
Tao, R.,
Color Image Encryption Using Pixel Scrambling Operator and
Reality-Preserving MPFRHT,
CirSysVideo(29), No. 7, July 2019, pp. 1919-1932.
IEEE DOI
1907
Transforms, Encryption, Color, Image color analysis, Indexes,
Color image encryption, Hartley transform,
chaos scrambling
BibRef
Li, G.D.[Guo-Dong],
Wang, L.L.[Le-Le],
Double chaotic image encryption algorithm based on optimal sequence
solution and fractional transform,
VC(35), No. 9, September 2018, pp. 1267-1277.
WWW Link.
1908
BibRef
Abdmouleh, M.K.[Med Karim],
Khalfallah, A.[Ali],
Bouhlel, M.S.[Med Salim],
Crypto-compression scheme based on the DWT for medical image security,
IJCVR(9), No. 4, 2019, pp. 340-350.
DOI Link
1908
BibRef
Melgar, M.E.V.[Max E. Vizcarra],
Farias, M.C.Q.[Mylène C.Q.],
A (2,2) XOR-based visual cryptography scheme without pixel expansion,
JVCIR(63), 2019, pp. 102592.
Elsevier DOI
1909
Visual cryptography, Visual secret sharing, Color interference
BibRef
Noura, H.N.[Hassan N.],
Chehab, A.[Ali],
Couturier, R.[Raphaël],
Efficient and secure cipher scheme with dynamic key-dependent mode of
operation,
SP:IC(78), 2019, pp. 448-464.
Elsevier DOI
1909
Lightweight flexible key-dependent cipher scheme,
Dynamic operation mode, Security and performance analysis
BibRef
Artiles, J.A.P.[José A.P.],
Chaves, D.P.B.[Daniel P.B.],
Pimentel, C.[Cecilio],
Image encryption using block cipher and chaotic sequences,
SP:IC(79), 2019, pp. 24-31.
Elsevier DOI
1911
Advanced encryption standard, Block cipher, Chaotic maps,
Image encryption, Security
BibRef
Karawia, A.[Abdelrahman],
Image encryption based on Fisher-Yates shuffling and three dimensional
chaotic economic map,
IET-IPR(13), No. 12, October 2019, pp. 2086-2097.
DOI Link
1911
BibRef
Yu, C.Z.[Chang-Zhi],
Li, H.J.[Heng-Jian],
Wang, X.[Xiyu],
SVD-based image compression, encryption, and identity authentication
algorithm on cloud,
IET-IPR(13), No. 12, October 2019, pp. 2224-2232.
DOI Link
1911
BibRef
Zhang, Q.Y.[Qiu-Yu],
Han, J.T.[Ji-Tian],
Ye, Y.T.[Yu-Tong],
Image encryption algorithm based on image hashing, improved chaotic
mapping and DNA coding,
IET-IPR(13), No. 14, 12 December 2019, pp. 2905-2915.
DOI Link
1912
BibRef
Zhang, Q.Y.[Qiu-Yu],
Han, J.T.[Ji-Tian],
Ye, Y.T.[Yu-Tong],
Multi-image encryption algorithm based on image hash, bit-plane
decomposition and dynamic DNA coding,
IET-IPR(15), No. 4, 2021, pp. 885-896.
DOI Link
2106
BibRef
Shao, Z.H.[Zhu-Hong],
Liu, X.L.[Xi-Lin],
Yao, Q.J.[Qi-Jun],
Qi, N.[Na],
Shang, Y.Y.[Yuan-Yuan],
Zhang, J.J.[Jing-Jing],
Multiple-image encryption based on chaotic phase mask and equal
modulus decomposition in quaternion gyrator domain,
SP:IC(80), 2020, pp. 115662.
Elsevier DOI
1912
Multiple-image encryption, Quaternion gyrator transform,
Chaotic phase mask, Equal modulus decomposition, Component combination
BibRef
Kang, X.J.[Xue-Jing],
Guo, Z.H.[Zi-Hui],
A new color image encryption scheme based on DNA encoding and
spatiotemporal chaotic system,
SP:IC(80), 2020, pp. 115670.
Elsevier DOI
1912
Color image encryption, DNA, Chaotic map, MLNCML system
BibRef
ALI-PACHA, H.[Hana],
HADJ-SAID, N.[Naima],
ALI-PACHA, A.[Adda],
Data security based on homographic function,
PRL(129), 2020, pp. 240-246.
Elsevier DOI
2001
Data security, Substitution cipher, Homographic function,
Chaos-based cryptography, Hénon map, Lightweight encryption algorithm
BibRef
Sfar, A.R.[A. Riahi],
Challal, Y.,
Moyal, P.,
Natalizio, E.,
A Game Theoretic Approach for Privacy Preserving Model in IoT-Based
Transportation,
ITS(20), No. 12, December 2019, pp. 4405-4414.
IEEE DOI
2001
Privacy, Games, Sensors, Game theory, Cryptography, Vehicles,
Internet of Things, intelligent transportation, privacy,
Markov chains
BibRef
Li, L.,
Wen, G.,
Wang, Z.,
Yang, Y.,
Efficient and Secure Image Communication System Based on Compressed
Sensing for IoT Monitoring Applications,
MultMed(22), No. 1, January 2020, pp. 82-95.
IEEE DOI
2001
Monitoring, Internet of Things, Compressed sensing,
Wireless sensor networks, Image communication,
chaotic systems
BibRef
Zhang, H.[Hao],
Wang, X.Q.[Xiao-Qing],
Wang, X.Y.[Xing-Yuan],
Yan, P.F.[Peng-Fei],
Novel multiple images encryption algorithm using CML system and DNA
encoding,
IET-IPR(14), No. 3, 28 February 2020, pp. 518-529.
DOI Link
2002
BibRef
Zhou, L.[Longfu],
Bai, S.[Sen],
Cao, Y.Q.[Yu-Qiang],
Wang, Y.L.[Ying-Long],
Image Visually Meaningful Cryptography Based on Julia Set Generating
and Information Hiding,
IWDW19(393-406).
Springer DOI
2003
BibRef
Jia, M.[Meng],
Image encryption with cross colour field algorithm and improved cascade
chaos systems,
IET-IPR(14), No. 5, 17 April 2020, pp. 973-981.
DOI Link
2004
BibRef
Kaur, M.[Manjit],
Singh, D.[Dilbag],
Uppal, R.S.[Raminder Singh],
Parallel strength Pareto evolutionary algorithm-II based image
encryption,
IET-IPR(14), No. 6, 11 May 2020, pp. 1015-1026.
DOI Link
2005
BibRef
Balaska, N.[Nawel],
Ahmida, Z.[Zahir],
Belmeguenai, A.[Aissa],
Boumerdassi, S.[Selma],
Image encryption using a combination of Grain-128a algorithm and
Zaslavsky chaotic map,
IET-IPR(14), No. 6, 11 May 2020, pp. 1120-1131.
DOI Link
2005
BibRef
Huang, H.Q.[Hui-Qing],
Yang, S.Z.[Shou-Zhi],
Ye, R.S.[Rui-Song],
Efficient symmetric image encryption by using a novel 2D chaotic system,
IET-IPR(14), No. 6, 11 May 2020, pp. 1157-1163.
DOI Link
2005
BibRef
Boussif, M.[Mohamed],
Aloui, N.[Noureddine],
Cherif, A.[Adnene],
Securing DICOM images by a new encryption algorithm using Arnold
transform and Vigenère cipher,
IET-IPR(14), No. 6, 11 May 2020, pp. 1209-1216.
DOI Link
2005
BibRef
Sudeepa, K.B.,
Aithal, G.[Ganesh],
Rajinikanth, V.,
Satapathy, S.C.[Suresh Chandra],
Genetic algorithm based key sequence generation for cipher system,
PRL(133), 2020, pp. 341-348.
Elsevier DOI
2005
Feedback shift register, Genetic algorithm,
Stream cipher system, Pseudo random number generator, Mutation
BibRef
Melkemi, M.[Mahmoud],
Hammoudi, K.[Karim],
Voronoi-based image representation applied to binary visual
cryptography,
SP:IC(87), 2020, pp. 115913.
Elsevier DOI
2007
Visual cryptography, Image communication, Visual communication,
Image sharing, Voronoi diagram, Visual representation
BibRef
Umoh, E.A.[Edwin A.],
Iloanusi, O.N.[Ogechukwu N.],
Nnolim, U.A.[Uche A.],
Image multi-encryption architecture based on hybrid keystream sequence
interspersed with Haar discrete wavelet transform,
IET-IPR(14), No. 10, August 2020, pp. 2081-2091.
DOI Link
2008
BibRef
Peng, F.,
Zhang, X.,
Lin, Z.,
Long, M.,
A Tunable Selective Encryption Scheme for H.265/HEVC Based on Chroma
IPM and Coefficient Scrambling,
CirSysVideo(30), No. 8, August 2020, pp. 2765-2780.
IEEE DOI
2008
Encryption, Syntactics, Streaming media, Bit rate, Visualization,
Encoding, H.265/HEVC, selective encryption,
edge extraction
BibRef
Zheng, J.Y.[Jie-Yu],
Liu, L.F.[Ling-Feng],
Novel image encryption by combining dynamic DNA sequence encryption and
the improved 2D logistic sine map,
IET-IPR(14), No. 11, September 2020, pp. 2310-2320.
DOI Link
2009
BibRef
Barik, R.C.[Ram Chandra],
Changder, S.[Suvamoy],
Perceptual accessible image encryption scheme conjugating multiple
chaotic maps,
IET-IPR(14), No. 11, September 2020, pp. 2457-2468.
DOI Link
2009
BibRef
Nakachi, T.[Takayuki],
Kiya, H.[Hitoshi],
Secure OMP Computation Maintaining Sparse Representations and Its
Application to EtC Systems,
IEICE(E103-D), No. 9, September 2020, pp. 1988-1997.
WWW Link.
2009
Encryption-then-Compression.
Orthogonal Matching Pursuit.
BibRef
Xiang, T.,
Yang, Y.,
Liu, H.,
Guo, S.,
Visual Security Evaluation of Perceptually Encrypted Images Based on
Image Importance,
CirSysVideo(30), No. 11, November 2020, pp. 4129-4142.
IEEE DOI
2011
Visualization, Encryption, Feature extraction, Image resolution,
Measurement, Visual security index, perceptual encryption,
log-Gabor filter
BibRef
Yang, Y.[Ying],
Xiang, T.[Tao],
Lv, X.[Xiao],
Guo, S.W.[Shang-Wei],
Zeng, T.Y.[Tie-Yong],
The Illusion of Visual Security:
Reconstructing Perceptually Encrypted Images,
CirSysVideo(34), No. 5, May 2024, pp. 3998-4010.
IEEE DOI
2405
Encryption, Visualization, Distortion, Image restoration,
Image reconstruction, Feature extraction, Threat modeling,
image restoration
BibRef
Sivaraman, R.[Rethinam],
Rajagopalan, S.[Sundararaman],
Rayappan, J.B.B.[John Bosco Balaguru],
Amirtharajan, R.[Rengarajan],
Ring oscillator as confusion- diffusion agent:
A complete TRNG drove image security,
IET-IPR(14), No. 13, November 2020, pp. 2987-2997.
DOI Link
2012
TRNG: true random number generators
BibRef
Sun, E.Y.N.[Elaine Y.N.],
Wu, H.C.[Hsiao-Chun],
Busch, C.[Costas],
Huang, S.C.H.[Scott C.H.],
Kuan, Y.C.[Yen-Cheng],
Chang, S.Y.[Shih Yu],
Efficient Recoverable Cryptographic Mosaic Technique by Permutations,
CirSysVideo(31), No. 1, January 2021, pp. 112-125.
IEEE DOI
2101
Sun, Receivers, Indexes, Encryption, Discrete cosine transforms,
Recoverable cryptographic mosaic, permutation,
Kullback-Leibler divergence of discrete cosine transform (DCT-KLD)
BibRef
Gao, L.,
Qi, L.,
Guan, L.,
The Property of Frequency Shift in 2D-FRFT Domain With Application to
Image Encryption,
SPLetters(28), 2021, pp. 185-189.
IEEE DOI
2102
Mathematical model, Encryption, Image reconstruction,
Transforms, Time-frequency analysis,
image encryption
BibRef
Tang, Y.D.[Ya-Dong],
Shao, Z.H.[Zhu-Hong],
Zhao, X.X.[Xiao-Xu],
Shang, Y.Y.[Yuan-Yuan],
Robust multiple color images encryption using discrete Fourier
transforms and chaotic map,
SP:IC(93), 2021, pp. 116168.
Elsevier DOI
2103
Multiple image encryption, Trinion number,
Discrete Fourier transform, Sharing, Random MR-SVD
BibRef
Wang, X.Y.[Xing-Yuan],
Su, Y.[Yining],
Image encryption based on compressed sensing and DNA encoding,
SP:IC(95), 2021, pp. 116246.
Elsevier DOI
2106
Image encryption, Compressed sensing, Four-wing chaotic system,
Kronecker product, DNA coding
BibRef
Wang, X.L.[Xiao-Long],
Yan, H.W.[Hao-Wen],
Zhang, L.M.[Li-Ming],
Vector Map Encryption Algorithm Based on Double Random Position
Permutation Strategy,
IJGI(10), No. 5, 2021, pp. xx-yy.
DOI Link
2106
BibRef
Zhao, T.Y.[Tie-Yu],
Yuan, L.[Lin],
Chi, Y.Y.[Ying-Ying],
Image encryption using linear weighted fractional-order transform,
JVCIR(77), 2021, pp. 103098.
Elsevier DOI
2106
Fractional-order Fourier transform,
Weighted fractional-order transform, Image encryption
BibRef
Yan, M.[Minxiu],
Xu, H.[Hui],
The multi-scroll hyper-chaotic coexistence attractors and its
application,
SP:IC(95), 2021, pp. 116210.
Elsevier DOI
2106
Hyper-chaotic system, Digital image encryption,
Multi-scroll attractor, Infinite coexistence attractors
BibRef
Yang, C.N.[Ching-Nung],
Yang, Y.Y.[Yi-Yun],
On the Analysis and Design of Visual Cryptography With Error
Correcting Capability,
CirSysVideo(31), No. 6, June 2021, pp. 2465-2479.
IEEE DOI
2106
Interference, Visualization, Decoding, Stacking, Cryptography,
Image reconstruction, Image color analysis, Secret sharing, error correction
BibRef
Chen, J.X.[Jun-Xin],
Chen, L.[Lei],
Zhou, Y.C.[Yi-Cong],
Cryptanalysis of Image Ciphers With Permutation-Substitution Network
and Chaos,
CirSysVideo(31), No. 6, June 2021, pp. 2494-2508.
IEEE DOI
2106
Ciphers, Encryption, Chaos, Kernel, Streaming media,
Chosen-ciphertext attack, permutation substitution, bit-wise XOR,
image encryption
BibRef
Oravec, J.[Jakub],
Ovseník, L.[Luboš],
Papaj, J.[Ján],
An image encryption algorithm with a plaintext-related quantisation
scheme,
IET-IPR(15), No. 9, 2021, pp. 2039-2055.
DOI Link
2106
BibRef
Yadav, S.[Shivani],
Singh, H.[Hukum],
Security augmentation grounded on Fresnel and Arnold transforms using
hybrid chaotic structured phase mask,
IET-IPR(15), No. 5, 2021, pp. 1042-1052.
DOI Link
2106
BibRef
Zhang, D.H.[Deng-Hui],
Zhu, H.B.[Hong-Bin],
Liu, S.L.[Sheng-Long],
Wei, X.[Xu],
HP-VCS:
A high-quality and printer-friendly visual cryptography scheme,
JVCIR(78), 2021, pp. 103186.
Elsevier DOI
2107
Visual cryptography scheme, Image security, Halftoning, Color VCS
BibRef
Chen, L.P.[Li-Ping],
Yin, H.[Hao],
Yuan, L.G.[Li-Guo],
Machado, J.A.T.[J.A. Tenreiro],
Wu, R.C.[Ran-Chao],
Alam, Z.[Zeeshan],
Double color image encryption based on fractional order discrete
improved Henon map and Rubik's cube transform,
SP:IC(97), 2021, pp. 116363.
Elsevier DOI
2107
Fractional-order discrete systems, Henon map, DNA encryption,
Double color image encryption
BibRef
Chen, J.X.[Jun-Xin],
Chen, L.[Lei],
Zhou, Y.C.[Yi-Cong],
Universal Chosen-Ciphertext Attack for a Family of Image Encryption
Schemes,
MultMed(23), 2021, pp. 2372-2385.
IEEE DOI
2108
Encryption, Nonlinear dynamical systems, Standards,
Technological innovation, Matrices, Cryptanalysis,
chosen-ciphertext attack
BibRef
Wang, X.Y.[Xing-Yuan],
Zhang, M.[Maozhen],
High-sensitivity synchronous image encryption based on improved
one-dimensional compound sine map,
IET-IPR(15), No. 10, 2021, pp. 2247-2265.
DOI Link
2108
BibRef
Yang, Y.[Ying],
Xiang, T.[Tao],
Liu, H.C.[Hang-Cheng],
Liao, X.F.[Xiao-Feng],
Convolutional Neural Network for Visual Security Evaluation,
CirSysVideo(31), No. 8, August 2021, pp. 3293-3307.
IEEE DOI
2108
Objective visual security evaluation of selectively encrypted images.
Visualization, Feature extraction, Indexes, Measurement, Encryption,
Visual security index, convolutional neural network,
weighted pooling
BibRef
Inoue, K.[Kotaro],
Cho, M.[Myungjin],
Amplitude based keyless optical encryption system using deep neural
network,
JVCIR(79), 2021, pp. 103251.
Elsevier DOI
2109
Optical encryption, Deep neural network,
Amplitude-based double random phase encryption
BibRef
Puteaux, P.[Pauline],
Puech, W.[William],
CFB-Then-ECB Mode-Based Image Encryption for an Efficient Correction
of Noisy Encrypted Images,
CirSysVideo(31), No. 9, September 2021, pp. 3338-3351.
IEEE DOI
2109
Cryptography, Encryption, Noise measurement, Ciphers,
Noise reduction, Forward error correction, Statistical analysis,
statistical analysis
BibRef
Aouissaoui, I.[Ichraf],
Bakir, T.[Toufik],
Sakly, A.[Anis],
Robustly correlated key-medical image for DNA-chaos based encryption,
IET-IPR(15), No. 12, 2021, pp. 2770-2786.
DOI Link
2109
BibRef
Man, Z.L.[Zhen-Long],
Li, J.Q.[Jin-Qing],
Di, X.Q.[Xiao-Qiang],
Medical image encryption scheme based on self-verification matrix,
IET-IPR(15), No. 12, 2021, pp. 2787-2798.
DOI Link
2109
BibRef
Mishra, P.[Pooja],
Bhaya, C.[Chiranjeev],
Pal, A.K.[Arup Kumar],
Singh, A.K.[Abhay Kumar],
A novel binary operator for designing medical and natural image
cryptosystems,
SP:IC(98), 2021, pp. 116377.
Elsevier DOI
2109
Abelian group, DICOM, DNA encoding, Image cryptosystem
BibRef
Ahmad, I.[Ijaz],
Shin, S.[Seokjoo],
A novel hybrid image encryption-compression scheme by combining chaos
theory and number theory,
SP:IC(98), 2021, pp. 116418.
Elsevier DOI
2109
Chaos theory, Image compression, Image encryption,
Medical image processing, Number theory
BibRef
Shahna, K.U.,
Mohamed, A.[Anuj],
Novel hyper chaotic color image encryption based on pixel and bit
level scrambling with diffusion,
SP:IC(99), 2021, pp. 116495.
Elsevier DOI
2111
Confusion and diffusion, Image encryption,
Keystream generation, Lorenz system, Security analysis
BibRef
Jiang, D.H.[Dong-Hua],
Liu, L.[Lidong],
Wang, X.Y.[Xing-Yuan],
Rong, X.W.[Xian-Wei],
Image encryption algorithm for crowd data based on a new hyperchaotic
system and Bernstein polynomial,
IET-IPR(15), No. 14, 2021, pp. 3698-3717.
DOI Link
2112
BibRef
Liu, P.[Pengbo],
Wang, X.Y.[Xing-Yuan],
Su, Y.[Yining],
Image Encryption via Complementary Embedding Algorithm and New
Spatiotemporal Chaotic System,
CirSysVideo(33), No. 5, May 2023, pp. 2506-2519.
IEEE DOI
2305
Lattices, Encryption, Airports, Cryptography,
Spatiotemporal phenomena, Frequency division multiplexing,
image security
BibRef
Li, Y.[Yu],
Zhang, L.M.[Li-Ming],
Wang, X.L.[Xiao-Long],
Zhang, X.G.[Xin-Gang],
Zhang, Q.H.[Qi-Hang],
A Novel Invariant Based Commutative Encryption and Watermarking
Algorithm for Vector Maps,
IJGI(10), No. 11, 2021, pp. xx-yy.
DOI Link
2112
BibRef
Zhang, F.F.[Fang-Fang],
Zhang, X.[Xue],
Cao, M.Y.[Mao-Yong],
Ma, F.Y.[Feng-Ying],
Li, Z.F.[Zheng-Feng],
Characteristic Analysis of 2D Lag-Complex Logistic Map and Its
Application in Image Encryption,
MultMedMag(28), No. 4, October 2021, pp. 96-106.
IEEE DOI
2112
Encryption, Cryptography, Bifurcation, Logistics, Floors,
Elliptic curve cryptography, Trajectory, Logistic map, chaos,
safety analysis
BibRef
Chen, J.X.[Jun-Xin],
Zhang, L.Y.[Leo Yu],
Zhou, Y.C.[Yi-Cong],
Re-Evaluation of the Security of a Family of Image Diffusion
Mechanisms,
CirSysVideo(31), No. 12, December 2021, pp. 4747-4758.
IEEE DOI
2112
Cryptography, Encryption, Ciphers,
Standards, Information science, Image resolution, Cryptanalysis,
bitwise exclusive OR
BibRef
Jain, K.[Kurunandan],
Aji, A.[Aravind],
Krishnan, P.[Prabhakar],
Medical Image Encryption Scheme Using Multiple Chaotic Maps,
PRL(152), 2021, pp. 356-364.
Elsevier DOI
2112
Telemedicine, Digital images, Chaotic map, Image encryption
BibRef
Zhao, Y.K.[Yong-Kang],
Fu, F.W.[Fang-Wei],
A contrast improved OR and XOR based (k,n) visual cryptography scheme
without pixel expansion,
JVCIR(82), 2022, pp. 103408.
Elsevier DOI
2201
Visual cryptography, Multiple decryptions, Contrast,
Perfect recovery, Threshold
BibRef
Sang, Y.P.[Yong-Peng],
Sang, J.[Jun],
Alam, M.S.[Mohammad S.],
Image encryption based on logistic chaotic systems and deep
autoencoder,
PRL(153), 2022, pp. 59-66.
Elsevier DOI
2201
Image encryption, Logistic chaotic systems, Deep autoencoder,
Uniform distribution
BibRef
Song, W.[Wei],
Fu, C.[Chong],
Tie, M.[Ming],
Sham, C.W.[Chiu-Wing],
Liu, J.[Jun],
Ma, H.F.[Hong-Feng],
A fast parallel batch image encryption algorithm using intrinsic
properties of chaos,
SP:IC(102), 2022, pp. 116628.
Elsevier DOI
2202
Batch image encryption, Chaos, Multithreading, Steganography
BibRef
Sun, Y.J.[Yu-Jie],
Zhang, H.[Hao],
Li, Z.Y.[Zhen-Yu],
Wang, X.Y.[Xing-Yuan],
Wang, C.P.[Chun-Peng],
An image cipher system based on networked chaotic
map with parameter q,
IET-IPR(16), No. 3, 2022, pp. 797-808.
DOI Link
2202
BibRef
Zhang, Y.S.[Yu-Shu],
Zhao, R.[Ruoyu],
Xiao, X.L.[Xiang-Li],
Lan, R.[Rushi],
Liu, Z.[Zhe],
Zhang, X.P.[Xin-Peng],
HF-TPE: High-Fidelity Thumbnail- Preserving Encryption,
CirSysVideo(32), No. 3, March 2022, pp. 947-961.
IEEE DOI
2203
Encryption, Privacy, Usability, Cloud computing, Visualization,
Software, Indexes, Balancing privacy and usability, cloud storage
BibRef
Huang, S.F.[Shu-Feng],
Huang, L.Q.[Lin-Qing],
Cai, S.T.[Shu-Ting],
Xiong, X.M.[Xiao-Ming],
Liu, Y.[Yuan],
Novel and secure plaintext-related image encryption algorithm based
on compressive sensing and tent-sine system,
IET-IPR(16), No. 6, 2022, pp. 1544-1557.
DOI Link
2204
BibRef
Chen, Y.C.[Yu-Chi],
Horng, G.[Gwoboa],
Cheating in (halftone-secret) visual cryptography:
Analysis of blind authentication schemes,
JVCIR(85), 2022, pp. 103489.
Elsevier DOI
2205
Visual cryptography, Human vision system, Binocular cheating,
Cheating prevention, Security
BibRef
Chai, X.L.[Xiu-Li],
Wang, Y.J.[Yin-Jing],
Chen, X.H.[Xiu-Hui],
Gan, Z.H.[Zhi-Hua],
Zhang, Y.S.[Yu-Shu],
TPE-GAN: Thumbnail Preserving Encryption Based on GAN With Key,
SPLetters(29), 2022, pp. 972-976.
IEEE DOI
2205
Ciphers, Encryption, Usability, Training, Privacy, Image coding,
Visualization, CycleGan, deep learning, image encryption, privacy and usability
BibRef
Chai, X.L.[Xiu-Li],
Ma, Y.K.[Ya-Kun],
Wang, Y.J.[Yig-Jing],
Gan, Z.H.[Zhi-Hua],
Zhang, Y.S.[Yu-Shu],
TPE-ADE: Thumbnail-Preserving Encryption Based on Adaptive Deviation
Embedding for JPEG Images,
MultMed(26), 2024, pp. 6102-6116.
IEEE DOI
2404
Encryption, Transform coding, Ciphers, Privacy, Usability,
Cryptography, Visualization, Thumbnail-preserving encryption,
low-resolution image retrieval
BibRef
Wen, W.Y.[Wen-Ying],
Jiang, Q.Y.[Qi-Yu],
Huang, H.G.[Hai-Gang],
Zhang, Y.S.[Yu-Shu],
Fang, Y.M.[Yu-Ming],
TPE-DF: Thumbnail Preserving Encryption via Dual-2DCS Fusion,
SPLetters(31), 2024, pp. 1039-1043.
IEEE DOI
2405
Visualization, Histograms, Encryption, Image reconstruction,
Usability, Privacy, Cloud computing, 2D compressive sensing,
thumbnail preserving encryption
BibRef
Zhang, Y.S.[Yu-Shu],
Zhou, W.T.[Wen-Tao],
Zhao, R.[Ruoyu],
Zhang, X.P.[Xin-Peng],
Cao, X.C.[Xiao-Chun],
F-TPE: Flexible Thumbnail-Preserving Encryption Based on Multi-Pixel
Sum-Preserving Encryption,
MultMed(25), 2023, pp. 5877-5891.
IEEE DOI
2311
BibRef
Xian, Y.J.[Yong-Jin],
Wang, X.Y.[Xing-Yuan],
Teng, L.[Lin],
Double Parameters Fractal Sorting Matrix and Its Application in Image
Encryption,
CirSysVideo(32), No. 6, June 2022, pp. 4028-4037.
IEEE DOI
2206
Sorting, Fractals, Security, Encryption, Iterative algorithms,
Information security, Frequency modulation,
image security
BibRef
Wen, Y.[Yan],
Su, J.M.[Jing-Ming],
Hong, Y.[Yan],
Gong, P.S.[Ping-Shun],
Hybrid mapping algorithm based on 1-DCM and Lorenz,
IET-IPR(16), No. 9, 2022, pp. 2467-2482.
DOI Link
2206
BibRef
Sheng, Y.H.[Yao-Hui],
Li, J.Q.[Jin-Qing],
Di, X.Q.[Xiao-Qiang],
Man, Z.L.[Zhen-Long],
Liu, Z.F.[Ze-Fei],
Bit-level image encryption algorithm based on fully-connected-like
network and random modification of edge pixels,
IET-IPR(16), No. 10, 2022, pp. 2769-2790.
DOI Link
2207
BibRef
Maksud, A.[Ahmed],
Hua, Y.[Yingbo],
Secret Key Generation by Continuous Encryption Before Quantization,
SPLetters(29), 2022, pp. 1497-1501.
IEEE DOI
2208
Quantization (signal), Biometrics (access control), Security,
Encryption, Communication system security, Signal to noise ratio,
wireless security
BibRef
Tan, X.G.[Xue-Gang],
Xiang, C.C.[Chang-Cheng],
Cao, J.[Jinde],
Xu, W.Y.[Wen-Ying],
Wen, G.H.[Guang-Hui],
Rutkowski, L.[Leszek],
Synchronization of Neural Networks via Periodic Self-Triggered
Impulsive Control and Its Application in Image Encryption,
Cyber(52), No. 8, August 2022, pp. 8246-8257.
IEEE DOI
2208
Artificial neural networks, Synchronization, Real-time systems,
Signal processing algorithms, Neurons, Monitoring, Encryption,
synchronization
BibRef
Wei, C.J.[Cheng-Jing],
Li, G.D.[Guo-Dong],
A selective image encryption scheme using LICC hyperchaotic system,
IET-IPR(16), No. 12, 2022, pp. 3342-3358.
DOI Link
2209
closed-loop coupling.
BibRef
Zhang, B.[Bo],
Xiao, D.[Di],
Li, Y.[Ying],
Yang, L.[Lei],
2D Compressed Sensing Using Nonlocal Low-Rank Prior Reconstruction
for Cipher-Image Coding,
SPLetters(29), 2022, pp. 2033-2037.
IEEE DOI
2210
Ciphers, Image coding, Image reconstruction, Encryption, Privacy,
Iterative algorithms, Approximation algorithms, encryption-then-compression
BibRef
Wu, X.T.[Xiao-Tian],
Luo, Z.L.[Zhong-Lin],
Block-based progressive visual cryptography scheme with uniform
progressive recovery and consistent background,
JVCIR(88), 2022, pp. 103631.
Elsevier DOI
2210
Secret sharing, Visual cryptography, Progressive recovery,
Consistent background, Image block
BibRef
Zhang, Y.[Yike],
Luo, W.B.[Wen-Bin],
Vector-Based Efficient Data Hiding in Encrypted Images via Multi-MSB
Replacement,
CirSysVideo(32), No. 11, November 2022, pp. 7359-7372.
IEEE DOI
2211
Image reconstruction, Encryption, Data privacy, Visualization,
Image coding, Image restoration, Decoding, Reversible data hiding,
location map
BibRef
Zheng, J.M.[Ji-Ming],
Lv, T.Y.[Tian-Yi],
Image encryption algorithm based on cascaded chaotic map and improved
Zigzag transform,
IET-IPR(16), No. 14, 2022, pp. 3863-3875.
DOI Link
2212
BibRef
Wu, X.T.[Xiao-Tian],
An, N.[Na],
Xu, Z.[Zishuo],
Sharing Multiple Secrets in XOR-Based Visual Cryptography by
Non-Monotonic Threshold Property,
CirSysVideo(33), No. 1, January 2023, pp. 88-103.
IEEE DOI
2301
Stacking, Visualization, Cryptography, Image reconstruction,
Image quality, Authentication, Visual systems, Secret sharing,
fully incrementing
BibRef
Tang, J.[Jianeng],
Zhang, Z.Z.[Ze-Zong],
Chen, P.Y.[Pei-Yang],
Zhang, F.[Feng],
Ni, H.[Hui],
Huang, Z.M.[Zhong-Ming],
An image layered scrambling encryption algorithm based on a novel
discrete chaotic map,
IET-IPR(17), No. 2, 2023, pp. 518-532.
DOI Link
2302
BibRef
Alsubaei, F.S.[Faisal S.],
Alneil, A.A.[Amani A.],
Mohamed, A.[Abdullah],
Hilal, A.M.[Anwer Mustafa],
Block-Scrambling-Based Encryption with Deep-Learning-Driven Remote
Sensing Image Classification,
RS(15), No. 4, 2023, pp. xx-yy.
DOI Link
2303
BibRef
Sundaram, G.[Gaurav],
Panna, B.[Bhaskar],
Jha, R.K.[Rajib Kumar],
Kumar, S.[Sumit],
Image encryption based on fractional discrete cosine transform and
DWT with interplane arrangements in dost domain,
IET-IPR(17), No. 4, 2023, pp. 1195-1207.
DOI Link
2303
adaptive signal processing, image processing
BibRef
Tang, B.[Bo],
Yang, C.[Cheng],
Zhang, Y.[Yana],
A Format Compliant Framework for HEVC Selective Encryption After
Encoding,
CirSysVideo(33), No. 3, March 2023, pp. 1140-1156.
IEEE DOI
2303
Encoding, Encryption, Cryptography, Syntactics, Arithmetic, Symbols,
Prediction algorithms, HEVC, encrypted after encoding,
bit flipping and insertion-deletion
BibRef
Sudha, K.A.[K. Antony],
Castro, V.C.[V. Cibi],
MuthuLakshmi, G.,
Parithi, T.I.[T. Ilam],
Raja, S.P.,
A Chaotic Encryption System Based on DNA Coding Using a Deep Neural
Network,
IJIG(23), No. 2 2023, pp. 2350020.
DOI Link
2303
BibRef
Wu, X.T.[Xiao-Tian],
Fang, J.[Jia],
Yan, W.Q.[Wei Qi],
Contrast Optimization for Size Invariant Visual Cryptography Scheme,
IP(32), 2023, pp. 2174-2189.
IEEE DOI
2304
Optimization, Linear programming, Cryptography, Visualization,
Stacking, Image quality, Image reconstruction, Secret sharing, size invariant
BibRef
Li, D.M.[Dong-Mei],
Liu, H.K.[Hai-Kuan],
Provable image encryption scheme via trapdoor permutation,
IET-IPR(17), No. 5, 2023, pp. 1355-1363.
DOI Link
2304
image encryption, one-way function, random reuse, trapdoor permutation
BibRef
Chen, Z.[Zan],
Ma, C.C.[Chao-Cheng],
Wang, T.[Tao],
Feng, Y.J.[Yuan-Jing],
Hou, X.S.[Xing-Song],
Qian, X.M.[Xue-Ming],
Robust image compression-encryption via scrambled block bernoulli
sampling with diffusion noise,
IET-IPR(17), No. 5, 2023, pp. 1478-1492.
DOI Link
2304
compressed sensing, image coding
BibRef
Liu, Z.N.[Zi-Nan],
Liu, T.[Tao],
Yan, B.[Bin],
Pan, J.S.[Jeng-Shyang],
Yang, H.M.[Hong-Mei],
Multitone reconstruction visual cryptography based on phase
periodicity,
JVCIR(93), 2023, pp. 103827.
Elsevier DOI
2305
Grayscale image, Visual cryptography, Phase periodicity, Light polarization
BibRef
Jiang, X.M.[Xiao-Man],
Jiang, G.Y.[Guang-Yu],
Wang, Q.K.[Qing-Ke],
Shu, D.D.[Dong-Dong],
Image encryption algorithm based on 2D-CLICM chaotic system,
IET-IPR(17), No. 7, 2023, pp. 2127-2141.
DOI Link
2305
Arnold transform, chaotic map, image encryption, image processing
BibRef
Sammeta, N.[Naresh],
Parthiban, L.[Latha],
Data Ownership and Secure Medical Data Transmission using Optimal
Multiple Key-Based Homomorphic Encryption with Hyperledger Blockchain,
IJIG(23), No. 3 2023, pp. 2240003.
DOI Link
2306
BibRef
Xu, G.W.[Guo-Wen],
Li, G.L.[Guan-Lin],
Guo, S.W.[Shang-Wei],
Zhang, T.W.[Tian-Wei],
Li, H.W.[Hong-Wei],
Secure Decentralized Image Classification With Multiparty Homomorphic
Encryption,
CirSysVideo(33), No. 7, July 2023, pp. 3185-3198.
IEEE DOI
2307
Training, Servers, Homomorphic encryption, Differential privacy,
Deep learning, Public key, Data models, Privacy protection,
homomorphic encryption
BibRef
Chen, F.[Fan],
Yang, Y.L.[Yao-Lin],
He, H.J.[Hong-Jie],
Yuan, Y.[Yuan],
Adaptive Coding and Ordered-Index Extended Scrambling Based RDH in
Encrypted Images,
MultMed(25), 2023, pp. 2864-2875.
IEEE DOI
2307
Cryptography, Encryption, Image coding, Encoding, Correlation, Resists,
Receivers, Reversible data hiding, image encryption,
chosen plaintext attack (CPA)
BibRef
Tang, Y.[Yun],
Cheng, L.[Lulu],
Lyu, W.L.[Wan-Li],
Yin, Z.X.[Zhao-Xia],
High Capacity Reversible Data Hiding for Encrypted 3d Mesh Models Based
on Topology,
IWDW22(205-218).
Springer DOI
2307
BibRef
Lata, N.[Navdeep],
Kumar, R.[Raman],
DSIT: A Dynamic Lightweight Cryptography Algorithm for Securing Image
in IoT Communication,
IJIG(23), No. 4 2023, pp. 2350035.
DOI Link
2308
BibRef
Nazari, H.[Hadi],
Bidgoli, M.M.[Mahmoud Mahlouji],
Ghasvari, H.[Hossein],
Integration of lightweight cryptography and watermarking with
compression for high speed and reliable communication of digital
images in IoT,
IET-IPR(17), No. 10, 2023, pp. 2984-3001.
DOI Link
2308
compressed sensing, cryptography, watermarking, wavelet transforms
BibRef
Gao, S.[Suo],
Wu, R.[Rui],
Wang, X.Y.[Xing-Yuan],
Liu, J.F.[Jia-Feng],
Li, Q.[Qi],
Wang, C.P.[Chun-Peng],
Tang, X.L.[Xiang-Long],
Asynchronous Updating Boolean Network Encryption Algorithm,
CirSysVideo(33), No. 8, August 2023, pp. 4388-4400.
IEEE DOI
2308
Encryption, Encoding, Cryptography, Trajectory, Bifurcation, Tensors,
NIST, Chaos, image encryption, image processing, Boolean network
BibRef
Wang, C.T.[Chun-Tao],
Hu, J.[Juan],
Bian, S.[Shan],
Ni, J.Q.[Jiang-Qun],
Zhang, X.P.[Xin-Peng],
A Customized Deep Network Based Encryption-Then-Lossy-Compression
Scheme of Color Images Achieving Arbitrary Compression Ratios,
CirSysVideo(33), No. 8, August 2023, pp. 4322-4336.
IEEE DOI
2308
Image coding, Cryptography, Image reconstruction, Encryption, Color,
Receivers, Optimization, Encrypted image compression, downsampling,
downsampling constraint
BibRef
Wang, C.T.[Chun-Tao],
Zhang, T.J.[Tian-Jian],
Chen, H.[Hao],
Huang, Q.[Qiong],
Ni, J.Q.[Jiang-Qun],
Zhang, X.P.[Xin-Peng],
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images
Using Customized Residual Dense Spatial Network,
MultMed(25), 2023, pp. 4026-4040.
IEEE DOI
2310
BibRef
Wang, H.[Hao],
Yang, X.[Xinsong],
Xiang, Z.R.[Zheng-Rong],
Tang, R.Q.[Rong-Qiang],
Ning, Q.[Qian],
Synchronization of Switched Neural Networks via Attacked
Mode-Dependent Event-Triggered Control and Its Application in Image
Encryption,
Cyber(53), No. 9, September 2023, pp. 5994-6003.
IEEE DOI
2309
BibRef
Chen, W.[Wei],
Wang, Y.C.[Yi-Chuan],
Xiao, Y.Q.[Ye-Qiu],
Hei, X.H.[Xin-Hong],
Explore the potential of deep learning and hyperchaotic map in the
meaningful visual image encryption scheme,
IET-IPR(17), No. 11, 2023, pp. 3235-3257.
DOI Link
2310
chaos, image colour analysis, image processing
BibRef
Su, Y.[Yining],
Teng, L.[Lin],
Liu, P.[Pengbo],
Unar, S.[Salahuddin],
Wang, X.Y.[Xing-Yuan],
Fu, X.P.[Xian-Ping],
Visualized Multiple Image Selection Encryption Based on Log Chaos
System and Multilayer Cellular Automata Saliency Detection,
CirSysVideo(33), No. 9, September 2023, pp. 4689-4702.
IEEE DOI
2310
BibRef
Zheng, J.M.[Ji-Ming],
Bao, T.Y.[Tian-Yu],
An image encryption algorithm based on cascade chaotic map and DNA
coding,
IET-IPR(17), No. 12, 2023, pp. 3510-3523.
DOI Link
2310
chaos, data privacy, image processing
BibRef
Meng, K.[Ke],
Wo, Y.[Yan],
An image compression and encryption scheme for similarity retrieval,
SP:IC(119), 2023, pp. 117044.
Elsevier DOI
2310
Information bottleneck, Compressed domain retrieval, Retrieval encryption,
Cascade compression encryption, Image similarity retrieval
BibRef
Jameel, S.K.[Samer Kais],
Majidpour, J.[Jafar],
BCS-AE: Integrated Image Compression-Encryption Model Based on AE and
Block-CS,
IJIG(23), No. 5 2023, pp. 2350047.
DOI Link
2310
BibRef
Jansen-van Rensburg, B.[Bianca],
Puech, W.[William],
Pedeboy, J.P.[Jean-Pierre],
A Format Compliant Encryption Method for 3D Objects Allowing
Hierarchical Decryption,
MultMed(25), 2023, pp. 7196-7207.
IEEE DOI
2311
BibRef
Sajitha, A.S.,
Priya, S.S.S.[S. Sridevi Sathya],
Analysis of Various Visual Cryptographic Techniques and their Issues
Based on Optimization Algorithms,
IJIG(23), No. 6 2023, pp. 2350059.
DOI Link
2312
BibRef
Yan, P.F.[Peng-Fei],
Zhang, H.[Hao],
Zhang, C.[Chuan],
Chang, R.Y.[Rui-Yun],
Sun, Y.J.[Yu-Jie],
Synchronization of Boolean networks with chaos-driving and its
application in image cryptosystem,
IET-IPR(17), No. 14, 2023, pp. 4176-4189.
DOI Link
2312
biology computing, chaos, compressed sensing, cryptography, image coding
BibRef
Gadde, S.[Swetha],
Amutharaj, J.,
Usha, S.,
Cloud Multimedia Data Security by Optimization-Assisted Cryptographic
Technique,
IJIG(24), No. 1, Januaur 2024, pp. 2450010.
DOI Link
2402
BibRef
Li, L.Z.[Li-Zong],
Image encryption algorithm based on hyperchaos and DNA coding,
IET-IPR(18), No. 3, 2024, pp. 627-649.
DOI Link
2402
DNA coding, hyperchaotic system, image diffusion, image encryption
BibRef
Yan, Y.Q.[Yu-Qian],
Wang, Y.[Yue],
Xue, L.L.[Lin-Lin],
Qiu, W.W.[Wei-Wei],
Wang, Z.[Zhongpeng],
2D compressed sensing of encrypted images based on complex-valued
measurement matrix,
IET-IPR(18), No. 3, 2024, pp. 572-588.
DOI Link
2402
chaos, compressed sensing, image processing, security of data
BibRef
Li, L.Z.[Li-Zong],
Image encryption algorithm based on hyperchaos and DNA coding,
IET-IPR(18), No. 3, 2024, pp. 627-649.
DOI Link
2402
DNA coding, hyperchaotic system, image diffusion, image encryption
BibRef
Zhang, C.[Chengrui],
Chen, J.X.[Jun-Xin],
Chen, D.M.[Dong-Ming],
Wang, W.[Wei],
Zhang, Y.S.[Yu-Shu],
Zhou, Y.C.[Yi-Cong],
Exploiting Substitution Box for Cryptanalyzing Image Encryption
Schemes With DNA Coding and Nonlinear Dynamics,
MultMed(26), 2024, pp. 1114-1128.
IEEE DOI
2402
Encryption, DNA, Encoding, Ciphers, Image coding, Security, Decoding,
Chosen-plaintext attack, DNA coding, image encryption, S-box matrix
BibRef
Li, C.Q.[Cheng-Qing],
Shen, X.H.[Xian-Hui],
Liu, S.[Sheng],
Cryptanalyzing an Image Encryption Algorithm Underpinned by 2-D
Lag-Complex Logistic Map,
MultMedMag(31), No. 1, January 2024, pp. 99-109.
IEEE DOI
2404
Encryption, Logistics, Heuristic algorithms,
Social networking (online), Resists,
Algorithm design and analysis
BibRef
Gong, M.X.[Meng-Xin],
Chai, X.L.[Xiu-Li],
Lu, Y.[Yang],
Zhang, Y.S.[Yu-Shu],
Exploiting Four-Dimensional Chaotic Systems With Dissipation and
Optimized Logical Operations for Secure Image Compression and
Encryption,
CirSysVideo(34), No. 8, August 2024, pp. 7628-7642.
IEEE DOI
2408
Encryption, Chaotic communication, Security, Image coding, Neurons,
Image reconstruction, Heuristic algorithms, Image encryption, logical operation
BibRef
Xin, Z.[Zihao],
Liu, S.[Sheng],
Zhou, X.Y.[Xiao-Yi],
Han, W.B.[Wen-Bao],
Ma, J.Q.[Jian-Qiang],
A metaheuristic image cryptosystem using improved parallel model and
many-objective optimization,
IET-IPR(18), No. 11, 2024, pp. 2838-2854.
DOI Link
2409
chaos, image processing, optimisation, parallel processing
BibRef
Shi, J.L.[Jiao-Li],
Hu, C.[Chao],
Zhang, S.L.[Shun-Li],
Zhou, Q.[Qing],
Mei, Z.L.[Zhuo-Lin],
Yao, S.M.[Shi-Mao],
Deng, A.[Anyuan],
An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy
Attribute-Based Encryption Scheme for Satellite Service Systems,
IJGI(13), No. 9, 2024, pp. 321.
DOI Link
2410
BibRef
Zhang, L.[Luozhi],
Wang, Q.[Qionghua],
Yu, Z.[Zhan],
Li, J.X.[Jin-Xi],
Bai, X.[Xing],
Zhou, X.[Xin],
Wu, Y.Y.[Yuan-Yuan],
Non-Cascaded and Crosstalk-Free Multi-Image Encryption Based on
Optical Scanning Holography Using 2D Orthogonal Compressive Sensing,
IP(33), 2024, pp. 5688-5702.
IEEE DOI
2410
Encryption, Compressed sensing, Pupils, Holography, Security,
Crosstalk, Noise, Image coding, Optical sensors, Optical imaging,
synthesis pupil encoding
BibRef
Wang, Y.[Yu],
Chen, L.Q.[Li-Quan],
Yu, K.[Kunliang],
Fu, T.[Tong],
A Secure Spatio-Temporal Chaotic Pseudorandom Generator for Image
Encryption,
CirSysVideo(34), No. 9, September 2024, pp. 8509-8521.
IEEE DOI
2410
Encryption, Security, Generators, Lattices, Chaotic communication,
Chaos, Degradation, UKF, spatio-temporal chaotic, PRNG,
provably security
BibRef
Hosny, K.M.[Khalid M.],
Elnabawy, Y.M.[Yasmin M.],
Elshewey, A.M.[Ahmed M.],
Alhammad, S.M.[Sarah M.],
Khafaga, D.S.[Doaa Sami],
Salama, R.[Rania],
New method of colour image encryption using triple chaotic maps,
IET-IPR(18), No. 12, 2024, pp. 3262-3276.
DOI Link
2411
chaos, encoding, image coding
BibRef
Rai, D.[Deepak],
Rajput, S.S.[Shayam Singh],
Arya, K.V.,
Pranav, P.[Prince],
Singh, S.[Shikha],
Sinha, A.[Aditi],
Advanced Encryption Standard (AES) Based Robust Watermarking Scheme,
ICCVMI23(1-4)
IEEE DOI
2403
Resistance, Low-pass filters, Watermarking, Rate distortion theory,
Intellectual property, Media, Robustness, Watermarking, Encryption, DWT
BibRef
Peng, H.[Hongwu],
Huang, S.[Shaoyi],
Zhou, T.[Tong],
Luo, Y.[Yukui],
Wang, C.H.[Cheng-Hong],
Wang, Z.[Zigeng],
Zhao, J.[Jiahui],
Xie, X.[Xi],
Li, A.[Ang],
Geng, T.[Tony],
Mahmood, K.[Kaleel],
Wen, W.[Wujie],
Xu, X.L.[Xiao-Lin],
Ding, C.[Caiwen],
AutoReP: Automatic ReLU Replacement for Fast Private Network
Inference,
ICCV23(5155-5165)
IEEE DOI
2401
Machine learning as a service. Data security.
BibRef
Chen, Y.L.[Yi-Ling],
Yao, Y.Z.[Yuan-Zhi],
Yu, N.H.[Neng-Hai],
Image Translation-Based Deniable Encryption against Model Extraction
Attack,
ICIP23(1330-1334)
IEEE DOI
2312
BibRef
Puteaux, P.[Pauline],
Puech, W.[William],
Localization and Correction of Corrupted Pixel Blocks in Noisy
Encrypted Images,
IPTA20(1-6)
IEEE DOI
2206
Training, Tools, Elliptic curve cryptography,
Error correction codes, Cryptography, Noise measurement,
signal processing in the encrypted domain
BibRef
Zheng, H.Y.[Hong-Ying],
Huang, Y.W.[Ya-Wen],
Li, L.[Lin],
Xiao, D.[Di],
Compressive Sensing-Based Image Encryption and Authentication in
Edge-Clouds,
MMMod22(II:382-393).
Springer DOI
2203
BibRef
Zhang, Y.[Yong],
Chen, A.[Aiguo],
Tang, Y.J.[Ying-Jun],
Ding, X.[Xiong],
Jiang, N.[Na],
Sun, Q.F.[Qian-Feng],
Comments on Test Methods of Encryption and Decryption Speeds of Image
Cryptosystems,
ICIVC21(284-288)
IEEE DOI
2112
Chaos, Tungsten, Benchmark testing, Hardware, Encryption, C# languages,
Indexes, image encryption, encryption and decryption speeds,
speed comparison
BibRef
Tian, J.[Jinyu],
Zhou, J.T.[Jian-Tao],
Duan, J.[Jia],
Probabilistic Selective Encryption of Convolutional Neural Networks
for Hierarchical Services,
CVPR21(2205-2214)
IEEE DOI
2111
Training, Degradation, Costs,
Computational modeling, Noise reduction, Probabilistic logic
BibRef
Yao, L.S.[Li-Sha],
Xu, G.M.[Guo-Ming],
Zhao, F.[Feng],
Application of Fish-swarm and Genetic Algorithm in Optimization of
Chaotic Image Encryption,
CVIDL20(76-83)
IEEE DOI
2102
chaos, cryptography, genetic algorithms, image coding,
genetic algorithm, image encrytion algorithm, Chaotic function
BibRef
Chen, Q.Q.[Qiu-Qiong],
Dai, Y.[Yao],
Niu, Z.Y.[Zhi-Yong],
An Image Encryption Algorithm Based on Combination of Chaos and DNA
Encoding,
CVIDL20(182-185)
IEEE DOI
2102
chaos, cryptography, image coding, matrix algebra, random sequences,
digital image encryption algorithm, cryptographic method,
Security analysis
BibRef
Chmielewski, L.J.[Leszek J.],
Orlowski, A.[Arkadiusz],
Does Randomness in the Random Visual Cryptography Protocol Depend on
the Period of Pseudorandom Number Generators?,
ICCVG20(36-47).
Springer DOI
2009
BibRef
Bian, S.[Song],
Wang, T.C.[Tian-Chen],
Hiromoto, M.[Masayuki],
Shi, Y.[Yiyu],
Sato, T.[Takashi],
ENSEI: Efficient Secure Inference via Frequency-Domain Homomorphic
Convolution for Privacy-Preserving Visual Recognition,
CVPR20(9400-9409)
IEEE DOI
2008
Convolution, Protocols, Frequency-domain analysis, Neural networks,
Encryption, Visualization
BibRef
Sedighi, M.,
Mahmoudi, S.K.,
Amini, A.S.,
Proposing a New Method for Encrypting Satellite Images Based On Hash
Function and Chaos Parameters,
SMPR19(949-953).
DOI Link
1912
BibRef
Puteaux, P.[Pauline],
Puech, W.[William],
Image Analysis and Processing in the Encrypted Domain,
ICIP19(3020-3022)
IEEE DOI
1910
Direct processing in encrypted domain.
Multimedia security, image encryption,
signal processing in the encrypted domain
BibRef
Lee, S.,
Huang, Y.,
Lin, J.,
WEB-VC: Visual Cryptography for Web Image,
ICIP19(4055-4059)
IEEE DOI
1910
Visual cryptography, flip visual cryptography,
secret image sharing, visual secret sharing, Web VC
BibRef
Bellafqira, R.[Reda],
Coatrieux, G.[Gouenou],
Genin, E.[Emmanuelle],
Cozic, M.[Michel],
Secure Multilayer Perceptron Based on Homomorphic Encryption,
IWDW18(322-336).
Springer DOI
1905
BibRef
Liu, Z.,
Yang, M.L.,
Yan, W.Q.,
Image encryption based on double random phase encoding,
IVCNZ17(1-6)
IEEE DOI
1902
cryptography, discrete cosine transforms,
discrete Fourier transforms, image coding, matrix algebra,
logistic map
BibRef
Touil, H.,
Akkad, N.E.,
Satori, K.,
Text Encryption:
Hybrid cryptographic method using Vigenere and Hill Ciphers.,
ISCV20(1-6)
IEEE DOI
2011
cryptography, data privacy, text analysis, computer networks,
cryptography, Cesar encryption algorithm,
Statistical attack.
BibRef
Es-sabry, M.,
El Akkad, N.,
Merras, M.,
Saaidi, A.,
Satori, K.,
Grayscale image encryption using shift bits operations,
ISCV18(1-7)
IEEE DOI
1807
cryptography, image processing, (N-1) generated images,
cryptography, decryption process, grayscale image encryption,
Key
BibRef
Hamici, Z.,
Image cryptography based on the imitation of gene fusion and
horizontal gene transfer,
IPTA17(1-6)
IEEE DOI
1804
cryptography, feature extraction, genetic algorithms, image coding,
image fusion, image representation, random sequences, HGT,
obfuscation
BibRef
Kang, X.,
Han, Z.,
Yu, A.,
Duan, P.,
Double random scrambling encoding in the RPMPFrHT domain,
ICIP17(4362-4366)
IEEE DOI
1803
Cryptography, Encoding, Indexes, Performance analysis,
Robustness, Sensitivity, Hartley transform, Image encryption,
logistic map
BibRef
Yonetani, R.,
Boddeti, V.N.,
Kitani, K.M.,
Sato, Y.,
Privacy-Preserving Visual Learning Using Doubly Permuted Homomorphic
Encryption,
ICCV17(2059-2069)
IEEE DOI
1802
cryptography, data privacy, image processing,
learning (artificial intelligence),
Visualization
BibRef
Zhang, Y.,
Li, X.Q.[Xue-Qian],
Hou, W.G.[Wen-Gang],
A fast image encryption scheme based on AES,
ICIVC17(624-628)
IEEE DOI
1708
Ciphers, Correlation, Encryption, Histograms, Information entropy,
Sensitivity, aes, cipher block chaining, image encryption,
information, security
BibRef
Yan, B.[Bing],
Bai, S.,
Design of image confusion-diffusion cryptosystem based on vector
quantization and cross chaotic map,
ICIVC17(639-644)
IEEE DOI
1708
Decoding, Encryption, Image coding, Indexes, Sensitivity analysis,
confusion-diffusion cryptosystem, cross chaotic map,
image compression and encryption, vector, quantization
BibRef
Shen, G.[Gang],
Liu, F.[Feng],
Fu, Z.X.[Zheng-Xin],
Yu, B.[Bin],
Wang, W.[Wen],
Halftone Visual Cryptography with Complementary Cover Images,
IWDW16(223-237).
Springer DOI
1703
BibRef
Wang, W.[Wen],
Liu, F.[Feng],
Guo, T.[Teng],
Ren, Y.W.[Ya-Wei],
Temporal Integration Based Visual Cryptography Scheme and Its
Application,
IWDW17(406-419).
Springer DOI
1708
BibRef
Earlier: A4, A2, A1, Only:
Collusive Attacks to Partition Authentication Visual Cryptography
Scheme,
IWDW16(238-250).
Springer DOI
1703
BibRef
Dutta, S.[Sabyasachi],
Roy, P.S.[Partha Sarathi],
Adhikari, A.[Avishek],
Sakurai, K.[Kouichi],
On the Robustness of Visual Cryptographic Schemes,
IWDW16(251-262).
Springer DOI
1703
BibRef
Goel, A.,
Chaudhari, K.,
Median based pixel selection for partial image encryption,
IPTA16(1-5)
IEEE DOI
1703
cryptography
BibRef
Wen, W.,
Zhang, Y.,
Fang, Y.,
Fang, Z.,
A novel selective image encryption method based on saliency detection,
VCIP16(1-4)
IEEE DOI
1701
Discrete wavelet transforms
BibRef
Abdmouleh, M.K.[Med Karim],
Khalfallah, A.[Ali],
Bouhlel, M.S.[Med Salim],
A Chaotic Cryptosystem for Color Image with Dynamic Look-Up Table,
ICISP16(91-100).
WWW Link.
1606
BibRef
Fatahbeygi, A.,
Akhlaghian, F.,
A new robust semi-blind image watermarking based on block
classification and visual cryptography,
IPRIA15(1-6)
IEEE DOI
1603
cryptography
BibRef
Belkaid, B.M.,
Mourad, L.,
Mehdi, C.,
Soltane, A.,
Secure transfer of medical images using hybrid encryption:
Authentication, confidentiality, integrity,
ICCVIA15(1-6)
IEEE DOI
1603
authorisation
BibRef
Jolfaei, A.[Alireza],
Wu, X.W.[Xin-Wen],
Muthukkumarasamy, V.[Vallipuram],
A Secure Lightweight Texture Encryption Scheme,
VSWS15(344-356).
Springer DOI
1603
BibRef
Wang, D.S.[Dao-Shun],
Yi, F.[Feng],
Yang, C.N.[Ching-Nung],
Visual Cryptography Scheme with Autostereogram,
IWDW14(364-375).
Springer DOI
1602
BibRef
Chen, Y.C.[Yu-Chi],
Lu, K.H.[Kun-Han],
Tso, R.L.[Ray-Lin],
Wu, M.E.[Mu-En],
An Improved Visual Cryptography with Cheating Prevention,
IWDW14(444-454).
Springer DOI
1602
BibRef
Liu, F.[Feng],
Wu, C.K.[Chuan-Kun],
Optimal XOR Based (2,n)-Visual Cryptography Schemes,
IWDW14(333-349).
Springer DOI
1602
BibRef
Liu, S.C.[Shen-Chuan],
Fujiyoshi, M.[Masaaki],
Kiya, H.[Hitoshi],
A cheat preventing method with efficient pixel expansion for
Naor-Shamir's visual cryptography,
ICIP14(5527-5531)
IEEE DOI
1502
Cloud computing
BibRef
Eluard, M.[Marc],
Maetz, Y.[Yves],
Doerr, G.[Gwenael],
Impact of geometry-preserving encryption on rendering time,
ICIP14(4787-4791)
IEEE DOI
1502
Collaboration
BibRef
Moreno Cañadas, A.[Agustín],
Palma Vanegas, N.P.[Nelly Paola],
Hernández Quitián, M.[Margoth],
Visual Cryptography Schemes Based in k -Linear Maps,
IWDW13(288-302).
Springer DOI
1407
BibRef
Panduranga, H.T.,
Kumar, H.S.S.[H.S. Sharath],
Kumar, S.K.N.[S.K. Naveen],
Hybrid approach for dual image encryption using nibble exchange and
Hill-cipher,
IMVIP12(101-104).
IEEE DOI
1302
BibRef
Liu, F.[Feng],
Guo, T.[Teng],
Wu, C.[ChuanKun],
Yang, C.N.[Ching-Nung],
Flexible Visual Cryptography Scheme without Distortion,
IWDW11(211-227).
Springer DOI
1208
BibRef
Di, H.[Hong],
Zheng, K.F.[Kang-Feng],
Niu, X.X.[Xin-Xin],
Zhang, X.[Xin],
Multiple-image compressed encryption and decryption by compressive
holography,
VCIP11(1-4).
IEEE DOI
1201
BibRef
Bajaj, N.[Nikesh],
Thakur, A.[Amit],
Enhancement of RC5 for image encryption,
ICIIP11(1-5).
IEEE DOI
1112
BibRef
Goumidi, D.E.,
Hachouf, F.,
Modified confusion-diffusion based satellite image cipher using chaotic
standard, logistic and sine maps,
EUVIP10(204-209).
IEEE DOI
1110
BibRef
Petrauskiene, V.,
Ragulskiene, J.,
Sakyte, E.,
Ragulskis, M.,
Near-Optimal Time Function for Secure Dynamic Visual Cryptography,
ISVC11(II: 300-309).
Springer DOI
1109
BibRef
Nien, H.H.,
Changchien, S.K.,
Wu, S.Y.,
Huang, C.K.,
A new Pixel-Chaotic-Shuffle method for image encryption,
ICARCV08(883-887).
IEEE DOI
1109
BibRef
Zhao, L.[Liang],
Adhikari, A.[Avishek],
Sakurai, K.[Kouichi],
A New Scrambling Evaluation Scheme Based on Spatial Distribution
Entropy and Centroid Difference of Bit-Plane,
DW10(29-44).
Springer DOI
1010
BibRef
Zhao, L.[Liang],
Adhikari, A.[Avishek],
Xiao, D.[Di],
Sakurai, K.[Kouichi],
Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel
Bit,
DW10(45-59).
Springer DOI
1010
BibRef
Faridnia, S.[Saed],
Faez, K.[Karim],
Image Encryption through Using Chaotic Function and Graph,
ICCVG10(I: 352-359).
Springer DOI
1009
BibRef
Ratan, R.[Ram],
Key Independent Retrieval of Chaotic Encrypted Images,
PReMI09(483-488).
Springer DOI
0912
BibRef
Mayouf, M.A.[Mabroka Ali],
Shukur, Z.[Zarina],
Using Animation in Active Learning Tool to Detect Possible Attacks in
Cryptographic Protocols,
IVIC09(510-520).
Springer DOI
0911
BibRef
Rane, S.D.[Shantanu D.],
Sun, W.[Wei],
Vetro, A.[Anthony],
Secure distortion computation among untrusting parties using
homomorphic encryption,
ICIP09(1485-1488).
IEEE DOI
0911
BibRef
Zhang, J.H.[Jian-Hong],
Chen, H.[Hua],
Geng, Q.[Qin],
Cryptoanalysis of Certificateless Partially Blind Signature and Proxy
Blind Signature Scheme,
CISP09(1-5).
IEEE DOI
0910
BibRef
Zhang, J.H.[Jian-Hong],
Gao, S.N.[Sheng-Nan],
Cryptoanlaysis of Two Proxy Blind Signature Schemes with Proxy
Revocation,
CISP09(1-4).
IEEE DOI
0910
BibRef
Lang, J.[Jun],
Tao, R.[Ran],
Wang, Y.[Yue],
The Generalized Weighted Fractional Fourier Transform and its
Application to Image Encryption,
CISP09(1-5).
IEEE DOI
0910
BibRef
Cao, Y.[Yun],
Qiu, R.[Runhe],
Fu, Y.Z.[Yu-Zhe],
Color Image Encryption Based on Hyper-Chaos,
CISP09(1-6).
IEEE DOI
0910
BibRef
He, B.[Bo],
Zhang, F.[Fang],
Luo, L.Y.[Long-Yan],
Du, M.K.[Mao-Kang],
Wang, Y.[Yong],
An Image Encryption Algorithm Based on Spatiotemporal Chaos,
CISP09(1-5).
IEEE DOI
0910
BibRef
Zhang, S.[Shuo],
Cai, R.[Ruhua],
Jiang, Y.C.[Ying-Chun],
Guo, S.P.[Shi-Ping],
An Image Encryption Algorithm Based on Multiple Chaos and Wavelet
Transform,
CISP09(1-5).
IEEE DOI
0910
BibRef
Xiao, Y.[Yu],
Zhang, H.Y.[Hai-Ying],
Ran, Q.W.[Qi-Wen],
Zhang, J.[Jin],
Tan, L.Y.[Li-Ying],
Image Encryption and Two Dimensional Discrete M-Parameter Fractional
Fourier Transform,
CISP09(1-4).
IEEE DOI
0910
BibRef
Podoba, T.,
Giesl, J.,
Vlcek, K.,
Image Encryption In Wavelet Domain Based on Chaotic Maps,
CISP09(1-5).
IEEE DOI
0910
BibRef
Weir, J.[Jonathan],
Yan, W.Q.[Wei-Qi],
Authenticating Visual Cryptography Shares Using 2D Barcodes,
IWDW11(196-210).
Springer DOI
1208
BibRef
Earlier:
Plane Transform Visual Cryptography,
DW10(60-74).
Springer DOI
1010
BibRef
Earlier:
Image Hatching for Visual Cryptography,
IMVIP09(59-64).
IEEE DOI
0909
BibRef
And:
Dot-Size Variant Visual Cryptography,
DW09(136-148).
Springer DOI
0908
BibRef
Piper, F.[Fred],
The Changing Face of Cryptography,
DW09(2).
Springer DOI
0908
BibRef
Chen, W.B.[Wei-Bin],
Zhang, X.[Xin],
Image encryption algorithm based on Henon chaotic system,
IASP09(94-97).
IEEE DOI
0904
BibRef
Du, Y.F.[Yan-Fang],
Zhang, J.[Jing],
Su, Y.T.[Yu-Ting],
Watermarking for Authentication of LZ-77 Compressed Documents,
DW07(365-372).
Springer DOI
0712
BibRef
Luo, H.[Hao],
Lu, Z.M.[Zhe-Ming],
Pan, J.S.[Jeng-Shyang],
Multiple Watermarking in Visual Cryptography,
DW07(60-70).
Springer DOI
0712
BibRef
Sadeghi, A.R.[Ahmad-Reza],
The Marriage of Cryptography and Watermarking:
Beneficial and Challenging for Secure Watermarking and Detection,
DW07(2-18).
Springer DOI
0712
BibRef
He, D.[Dake],
Jagmohan, A.[Ashish],
Lu, L.G.[Li-Gang],
Secure collaboration using Slepian-Wolf codes,
ICIP08(2216-2219).
IEEE DOI
0810
BibRef
Seshadrinathan, M.[Manoj],
Dempski, K.L.[Kelly L.],
Implementation of Advanced Encryption Standard for encryption and
decryption of images and text on a GPU,
CVGPU08(1-6).
IEEE DOI
0806
BibRef
Alface, P.R.[Patrice Rondao],
Macq, B.[Benoit],
Cayre, F.[Francois],
Blind and Robust Watermarking of 3D Models:
How to Withstand the Cropping Attack?,
ICIP07(V: 465-468).
IEEE DOI
0709
BibRef
Huang, T.J.[Tie-Jun],
Evolvement of DRM Schema: From Encryption to Interoperability and
Monitoring,
MCAM07(65-75).
Springer DOI
0706
BibRef
Lai, J.C.[Jen-Chieh],
Wang, C.H.[Chia-Hui],
Buffer Occupancy Feedback Security Control and Changing Encryption Keys
to Protect MOD Services,
PSIVT06(888-897).
Springer DOI
0612
BibRef
Li, W.H.[Wei-Hai],
Yuan, Y.[Yuan],
Visual Information Encryption in Frequency Domain: Risk and Enhancement,
IWICPAS06(225-234).
Springer DOI
0608
BibRef
Wong, A.,
Bishop, W.,
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in
Scanned Documents for Digital Image Encryption,
CRV06(51-51).
IEEE DOI
0607
BibRef
Said, A.,
Measuring the Strength of Partial Encryption Schemes,
ICIP05(II: 1126-1129).
IEEE DOI
0512
BibRef
Katzenbeisser, S.[Stefan],
On the Integration of Watermarks and Cryptography,
DW03(50-60).
Springer DOI
0405
BibRef
Li, S.J.[Shu-Jun],
Zheng, X.[Xuan],
On the security of an image encryption method,
ICIP02(II: 925-928).
IEEE DOI
0210
BibRef
Yamaguchi, Y.S.[Yasu-Shi],
An Extended Visual Cryptography Scheme for Continuous-Tone Images,
IWDW11(228-242).
Springer DOI
1208
BibRef
Nakajima, M.,
Yamaguchi, Y.S.[Yasu-Shi],
Extended Visual Cryptography for Natural Images,
WSCG02(303).
HTML Version.
0209
BibRef
Han, K.,
Tewfik, A.,
Scalable Cryptographic Scheme for Networked Multimedia Applications,
ICIP01(III: 987-990).
IEEE DOI
0108
BibRef
Chen, Y.C.,
Chang, L.W.,
A Secure and Robust Digital Watermarking Technique by the Block Cipher
Rc6 and Secure Hash Algorithm,
ICIP01(II: 518-521).
IEEE DOI
0108
BibRef
Bhattacharjee, S.,
Kutter, M.,
Compression tolerant image authentication,
ICIP98(I: 435-439).
IEEE DOI
9810
BibRef
Creusere, C.D.,
Mitra, S.K.,
Efficient image scrambling using polyphase filter banks,
ICIP94(II: 81-85).
IEEE DOI
9411
BibRef
Chapter on OCR, Document Analysis and Character Recognition Systems continues in
Encryption or JPEG Coded Images, JPEG and Encryption .