Encryption of image data using compressive sensing and chaotic system

[1]  R. Amutha,et al.  Compressive sensing based image compression-encryption using Novel 1D-Chaotic map , 2018, Multimedia Tools and Applications.

[2]  M. Al-Ayyoub,et al.  Collusion attacks mitigation in internet of things: a fog based model , 2018, Multimedia Tools and Applications.

[3]  Anupam Chattopadhyay,et al.  Secure and Lightweight Compressive Sensing Using Stream Cipher , 2018, IEEE Transactions on Circuits and Systems II: Express Briefs.

[4]  R. Amutha,et al.  Double image compression and encryption scheme using logistic mapped convolution and cellular automata , 2018, Multimedia tools and applications.

[5]  Xuan Li,et al.  Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram , 2017, Multimedia Tools and Applications.

[6]  Tao Xiang,et al.  Securing image information using double random phase encoding and parallel compressive sensing with updated sampling processes , 2017 .

[7]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..

[8]  Kavitha Chandranbabu,et al.  Crypt analysis of an image compression-encryption algorithm and a modified scheme using compressive sensing , 2017 .

[9]  Siu-Ming Yiu,et al.  Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..

[10]  Lixiang Li,et al.  Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks , 2017, IEEE Transactions on Biomedical Circuits and Systems.

[11]  Yong Wang,et al.  An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications , 2017, J. Vis. Commun. Image Represent..

[12]  Hong Wang,et al.  Image compression-encryption scheme combining 2D compressive sensing with discrete fractional random transform , 2017, Multimedia Tools and Applications.

[13]  Christoph Ruland,et al.  Compressive Sensing encryption modes and their security , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).

[14]  Safya Belghith,et al.  A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..

[15]  Jiantao Zhou,et al.  A Review of Compressive Sensing in Information Security Field , 2016, IEEE Access.

[16]  Robin Fay,et al.  Introducing the counter mode of operation to Compressed Sensing based encryption , 2016, Inf. Process. Lett..

[17]  R. Amutha,et al.  Cosine Number Transform based hybrid image compression-encryption , 2016, 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[18]  Yong Xiang,et al.  On the Security of Compressed Sensing-Based Signal Cryptosystem , 2015, IEEE Transactions on Emerging Topics in Computing.

[19]  Yicong Zhou,et al.  Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.

[20]  R. Amutha,et al.  Energy-efficient low bit rate image compression in wavelet domain for wireless image sensor networks , 2015 .

[21]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[22]  Ramachandran Amutha,et al.  Image cryptography using Discrete Haar Wavelet transform and Arnold Cat Map , 2015, 2015 International Conference on Communications and Signal Processing (ICCSP).

[23]  Jin Li,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.

[24]  Jianhua Wu,et al.  Novel hybrid image compression–encryption algorithm based on compressive sensing , 2014 .

[25]  Jin Li,et al.  Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.

[26]  R. Amutha,et al.  A new Multistage multiple image encryption using a combination of Chaotic Block Cipher and Iterative Fractional Fourier Transform , 2014, 2014 First International Conference on Networks & Soft Computing (ICNSC2014).

[27]  Kwok-Wo Wong,et al.  Towards Secure Compressive Sampling Scheme , 2014, ArXiv.

[28]  Y. Asnath Victy Phamila,et al.  Low complexity energy efficient very low bit-rate image compression scheme for wireless sensor network , 2013, Inf. Process. Lett..

[29]  Sos S. Agaian,et al.  Local Shannon entropy measure with statistical tests for image randomness , 2013, Inf. Sci..

[30]  Dustin G. Mixon,et al.  Certifying the Restricted Isometry Property is Hard , 2012, IEEE Transactions on Information Theory.

[31]  Hong Sun,et al.  Compressive Sensing With Chaotic Sequence , 2010, IEEE Signal Processing Letters.

[32]  Christian Jutten,et al.  A Fast Approach for Overcomplete Sparse Decomposition Based on Smoothed $\ell ^{0}$ Norm , 2008, IEEE Transactions on Signal Processing.

[33]  E. Candès The restricted isometry property and its implications for compressed sensing , 2008 .

[34]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[35]  Shashank Gupta,et al.  Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms , 2016 .

[36]  Jin Li,et al.  New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.

[37]  G. Kutyniok,et al.  Compressed Sensing , 2014 .

[38]  Riccardo Rovatti,et al.  Low-complexity Multiclass Encryption by Compressed Sensing, Part II: Known-Plaintext Attacks , 2013, ArXiv.