Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps
暂无分享,去创建一个
Sen Bai | Xiaoyong Ji | Guibin Zhu | Bing Yan | Xiaoyong Ji | Bing Yan | Sen Bai | Guibin Zhu
[1] C.-C. Jay Kuo,et al. On the security of a secure Lempel-Ziv-Welch (LZW) algorithm , 2011, 2011 IEEE International Conference on Multimedia and Expo.
[2] Guanrong Chen,et al. Cryptanalysis of an image encryption scheme , 2006, J. Electronic Imaging.
[3] Sen Bai,et al. Generalized knight's tour on 3D chessboards , 2010, Discret. Appl. Math..
[4] Di Xiao,et al. GLS coding based security solution to JPEG with the structure of aggregated compression and encryption , 2014, Commun. Nonlinear Sci. Numer. Simul..
[5] Rengarajan Amirtharajan,et al. Horse Riding & Hiding in Image for Data Guarding , 2012 .
[6] Enrico Magli,et al. Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.
[7] Zhi-liang Zhu,et al. A New Hyper-Chaos Generated from Chen's System via an External Periodic Perturbation , 2009, 2009 International Workshop on Chaos-Fractals Theories and Applications.
[8] Kwok-Wo Wong,et al. A chaos-based joint image compression and encryption scheme using DCT and SHA-1 , 2011, Appl. Soft Comput..
[9] Kamlesh Gupta,et al. Novel Approach for fast Compressed Hybrid color image Cryptosystem , 2012, Adv. Eng. Softw..
[10] Shiguo Lian,et al. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system , 2012, J. Syst. Softw..
[11] K. P. Subbalakshmi,et al. Cryptanalysis of Some Multimedia Encryption Schemes , 2008, IEEE Transactions on Multimedia.
[12] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[13] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.
[14] Anish Philip. A Generalized Pseudo-Knight?s Tour Algorithm for Encryption of an Image , 2013, IEEE Potentials.
[15] Gabriel Nivasch. Experimental Results on Hamiltonian-Cycle-Finding Algorithms , 2003 .
[16] Oscar C. Au,et al. Comments on "A Novel Compression and Encryption Scheme Using Variable Model Arithmetic Coding and Coupled Chaotic System" , 2008, IEEE Trans. Circuits Syst. I Regul. Pap..
[17] V. Scott Gordon,et al. The knight's tour - evolutionary vs. depth-first search , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[18] Bai Sen,et al. A novel algorithm for scrambling the details of digital image , 2002, Proceedings of the 4th World Congress on Intelligent Control and Automation (Cat. No.02EX527).
[19] Kwok-Wo Wong,et al. Breaking an image compression and encryption scheme based on Chinese Remainder Theorem , 2013, ArXiv.
[20] Kwok-Wo Wong,et al. Embedding Compression in Chaos-Based Cryptography , 2008, IEEE Transactions on Circuits and Systems II: Express Briefs.
[21] Yuan Yan Tang,et al. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation , 2014, IEEE Transactions on Information Forensics and Security.
[22] Hyungjin Kim,et al. Binary arithmetic coding with key-based interval splitting , 2006, IEEE Signal Processing Letters.
[23] Sen Bai,et al. Generalized Knight's Tour Problem and Its Solutions Algorithm , 2006, 2006 International Conference on Computational Intelligence and Security.
[24] Oscar C. Au,et al. Adaptive Chosen-Ciphertext Attack on Secure Arithmetic Coding , 2009, IEEE Transactions on Signal Processing.
[25] Oscar C. Au,et al. Security Analysis of Multimedia Encryption Schemes Based on Multiple Huffman Table , 2007, IEEE Signal Processing Letters.
[26] Kwok-Wo Wong,et al. A Modified Chaos-Based Joint Compression and Encryption Scheme , 2011, IEEE Transactions on Circuits and Systems II: Express Briefs.