Encryption of image data using compressive sensing and chaotic system
暂无分享,去创建一个
[1] R. Amutha,et al. Compressive sensing based image compression-encryption using Novel 1D-Chaotic map , 2018, Multimedia Tools and Applications.
[2] M. Al-Ayyoub,et al. Collusion attacks mitigation in internet of things: a fog based model , 2018, Multimedia Tools and Applications.
[3] Anupam Chattopadhyay,et al. Secure and Lightweight Compressive Sensing Using Stream Cipher , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.
[4] R. Amutha,et al. Double image compression and encryption scheme using logistic mapped convolution and cellular automata , 2018, Multimedia tools and applications.
[5] Xuan Li,et al. Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram , 2017, Multimedia Tools and Applications.
[6] Tao Xiang,et al. Securing image information using double random phase encoding and parallel compressive sensing with updated sampling processes , 2017 .
[7] Jin Li,et al. Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..
[8] Kavitha Chandranbabu,et al. Crypt analysis of an image compression-encryption algorithm and a modified scheme using compressive sensing , 2017 .
[9] Siu-Ming Yiu,et al. Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..
[10] Lixiang Li,et al. Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks , 2017, IEEE Transactions on Biomedical Circuits and Systems.
[11] Yong Wang,et al. An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications , 2017, J. Vis. Commun. Image Represent..
[12] Hong Wang,et al. Image compression-encryption scheme combining 2D compressive sensing with discrete fractional random transform , 2017, Multimedia Tools and Applications.
[13] Christoph Ruland,et al. Compressive Sensing encryption modes and their security , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).
[14] Safya Belghith,et al. A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..
[15] Jiantao Zhou,et al. A Review of Compressive Sensing in Information Security Field , 2016, IEEE Access.
[16] Robin Fay,et al. Introducing the counter mode of operation to Compressed Sensing based encryption , 2016, Inf. Process. Lett..
[17] R. Amutha,et al. Cosine Number Transform based hybrid image compression-encryption , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[18] Yong Xiang,et al. On the Security of Compressed Sensing-Based Signal Cryptosystem , 2015, IEEE Transactions on Emerging Topics in Computing.
[19] Yicong Zhou,et al. Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.
[20] R. Amutha,et al. Energy-efficient low bit rate image compression in wavelet domain for wireless image sensor networks , 2015 .
[21] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[22] Ramachandran Amutha,et al. Image cryptography using Discrete Haar Wavelet transform and Arnold Cat Map , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).
[23] Jin Li,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.
[24] Jianhua Wu,et al. Novel hybrid image compression–encryption algorithm based on compressive sensing , 2014 .
[25] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[26] R. Amutha,et al. A new Multistage multiple image encryption using a combination of Chaotic Block Cipher and Iterative Fractional Fourier Transform , 2014, 2014 First International Conference on Networks & Soft Computing (ICNSC2014).
[27] Kwok-Wo Wong,et al. Towards Secure Compressive Sampling Scheme , 2014, ArXiv.
[28] Y. Asnath Victy Phamila,et al. Low complexity energy efficient very low bit-rate image compression scheme for wireless sensor network , 2013, Inf. Process. Lett..
[29] Sos S. Agaian,et al. Local Shannon entropy measure with statistical tests for image randomness , 2013, Inf. Sci..
[30] Dustin G. Mixon,et al. Certifying the Restricted Isometry Property is Hard , 2012, IEEE Transactions on Information Theory.
[31] Hong Sun,et al. Compressive Sensing With Chaotic Sequence , 2010, IEEE Signal Processing Letters.
[32] Christian Jutten,et al. A Fast Approach for Overcomplete Sparse Decomposition Based on Smoothed $\ell ^{0}$ Norm , 2008, IEEE Transactions on Signal Processing.
[33] E. Candès. The restricted isometry property and its implications for compressed sensing , 2008 .
[34] E.J. Candes,et al. An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.
[35] Shashank Gupta,et al. Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms , 2016 .
[36] Jin Li,et al. New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.
[37] G. Kutyniok,et al. Compressed Sensing , 2014 .
[38] Riccardo Rovatti,et al. Low-complexity Multiclass Encryption by Compressed Sensing, Part II: Known-Plaintext Attacks , 2013, ArXiv.