Generating visually coherent encrypted images with reversible data hiding in wavelet domain by fusing chaos and pairing function
暂无分享,去创建一个
[1] Vinod Patidar,et al. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption , 2011 .
[2] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[3] Ali Kanso,et al. An algorithm for encryption of secret images into meaningful images , 2017 .
[4] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[5] Hong Sun,et al. Compressive Sensing With Chaotic Sequence , 2010, IEEE Signal Processing Letters.
[6] TanTieniu,et al. An SVD-based watermarking scheme for protecting rightful ownership , 2002 .
[7] Olcay Taner Yildiz,et al. Cryptanalysis of Fridrich's Chaotic Image Encryption , 2010, Int. J. Bifurc. Chaos.
[8] Niels Provos,et al. Hide and Seek: An Introduction to Steganography , 2003, IEEE Secur. Priv..
[9] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[10] Musheng Chen,et al. A novel image encryption method based on fractional Fourier transform and odd-even quantification , 2016, International Conference on Digital Image Processing.
[11] Sanjeev Kumar,et al. A novel fractional order chaos-based image encryption using Fisher Yates algorithm and 3-D cat map , 2018, Multimedia Tools and Applications.
[12] Narendra Ahuja,et al. A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[13] Xuejia Lai,et al. Markov Ciphers and Differential Cryptanalysis , 1991, EUROCRYPT.
[14] L. Kocarev,et al. Logistic map as a block encryption algorithm , 2001 .
[15] Juliano B. Lima,et al. Image encryption based on the fractional Fourier transform over finite fields , 2014, Signal Process..
[16] W. Sweldens. The Lifting Scheme: A Custom - Design Construction of Biorthogonal Wavelets "Industrial Mathematics , 1996 .
[17] Pradeep K. Atrey,et al. Analysis and extension of multiresolution singular value decomposition , 2014, Inf. Sci..
[18] Rastislav Lukac,et al. Efficient encryption of wavelet-based coded color images , 2005, Pattern Recognit..
[19] Ali Broumandnia,et al. The 3D modular chaotic map to digital color image encryption , 2019, Future Gener. Comput. Syst..
[20] Andreas Pfitzmann,et al. Attacks on Steganographic Systems , 1999, Information Hiding.
[21] M. François,et al. Image Encryption Algorithm Based on a Chaotic Iterative Process , 2012 .
[22] Juliano B. Lima,et al. A finite field cosine transform-based image processing scheme for color image encryption , 2015, 2015 IEEE Global Conference on Signal and Information Processing (GlobalSIP).
[23] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[24] John T. Sheridan,et al. Optical double image encryption employing a pseudo image technique in the Fourier domain , 2014 .
[25] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[26] Xiao Liu,et al. A novel chaos-based bit-level permutation scheme for digital image encryption , 2011 .
[27] S. Agaian,et al. NPCR and UACI Randomness Tests for Image Encryption , 2011 .
[28] Yicong Zhou,et al. 2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..
[29] Kwok-Wo Wong,et al. An efficient chaotic image encryption algorithm based on a generalized Arnold map , 2012, Nonlinear Dynamics.
[30] Abdul Hanan Abdullah,et al. Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence , 2014 .
[31] Shujun Li,et al. Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[32] Amit Kumar Singh,et al. An improved DWT-SVD domain watermarking for medical information security , 2020, Comput. Commun..
[33] Yicong Zhou,et al. Image encryption: Generating visually meaningful encrypted images , 2015, Inf. Sci..
[34] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[35] Wojciech Mazurczyk,et al. Hiding information in a Stream Control Transmission Protocol , 2011, Comput. Commun..
[36] Guanrong Chen,et al. A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.
[37] Jessica J. Fridrich,et al. Detecting LSB Steganography in Color and Gray-Scale Images , 2001, IEEE Multim..
[38] Hong Liu,et al. Cryptanalyzing an image encryption scheme based on hybrid chaotic system and cyclic elliptic curve , 2014 .
[39] Yushu Zhang,et al. Image salient regions encryption for generating visually meaningful ciphertext image , 2016, Neural Computing and Applications.
[40] Wim Sweldens,et al. The lifting scheme: a construction of second generation wavelets , 1998 .
[41] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[42] M. Baptista. Cryptography with chaos , 1998 .
[43] Ayman Ibaida,et al. Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems , 2013, IEEE Transactions on Biomedical Engineering.
[44] J C Judge,et al. Steganography: Past, Present, Future , 2001 .
[45] Yiran Chen,et al. A visually secure image encryption scheme based on compressive sensing , 2017, Signal Process..
[46] Yicong Zhou,et al. A new chaotic system for image encryption , 2012, 2012 International Conference on System Science and Engineering (ICSSE).
[47] H. Cantor. Ueber eine Eigenschaft des Inbegriffs aller reellen algebraischen Zahlen. , 1984 .