In this paper, a new encryption scheme with three different modes of operations is proposed based on dual space-filling curves (SFSs) and a fractional wavelet transform (FrWT). This scheme is initially proposed for images and then extended to videos. The core idea behind the proposed schemes is to decompose an image/video first by the FrWT followed by the shuffling of each sub-band coefficients by means of a dual SFC. At last, an inverse FrWT is performed to get the encrypted image/video. A reliable decryption process is also proposed to construct the original image from the encrypted image. The experimental results, security and comparative analysis demonstrate the efficiency and robustness of the proposed scheme. Further, this paper also ...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
Depending on applications and specific security requirements, digital images can either be fully or ...
In this paper, a new encryption scheme with three different modes of operations is proposed based on...
We propose three novel algorithms for video encryption and decryption. The algorithms insert one-lev...
Secured communication has been a common practice in the social life. The main idea of encryption is ...
Conventional encryption techniques are usually applicable for text data and often unsuited for encry...
Conventional encryption techniques are usually applicable for text data and often unsuited for encry...
A number of methods have been proposed in the literature for the encryption of two-dimensional image...
This paper presents a review on various image encryption schemes based on fractional transforms for ...
AbstractA multiple-image cryptosystem is proposed based on the cascaded fractional Fourier transform...
Security is one of the most challenging aspects in internet and Multimedia applications. Encryption ...
In this paper, a new watermark embedding and detecting method for blind and robust digital watermark...
AbstractEncryption is one of the well known techniques to provide security in transmission of multim...
We propose a generalization of the encryption system based on double random phase encoding (DRPE) an...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
Depending on applications and specific security requirements, digital images can either be fully or ...
In this paper, a new encryption scheme with three different modes of operations is proposed based on...
We propose three novel algorithms for video encryption and decryption. The algorithms insert one-lev...
Secured communication has been a common practice in the social life. The main idea of encryption is ...
Conventional encryption techniques are usually applicable for text data and often unsuited for encry...
Conventional encryption techniques are usually applicable for text data and often unsuited for encry...
A number of methods have been proposed in the literature for the encryption of two-dimensional image...
This paper presents a review on various image encryption schemes based on fractional transforms for ...
AbstractA multiple-image cryptosystem is proposed based on the cascaded fractional Fourier transform...
Security is one of the most challenging aspects in internet and Multimedia applications. Encryption ...
In this paper, a new watermark embedding and detecting method for blind and robust digital watermark...
AbstractEncryption is one of the well known techniques to provide security in transmission of multim...
We propose a generalization of the encryption system based on double random phase encoding (DRPE) an...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
Depending on applications and specific security requirements, digital images can either be fully or ...