Conventional encryption techniques are usually applicable for text data and often unsuited for encrypting multimedia objects for two reasons. Firstly, the huge sizes associated with multimedia objects make conventional encryption computationally costly. Secondly, multimedia objects come with massive redundancies which are useful in avoiding encryption of the objects in their entirety. Hence a class of encryption techniques devoted to encrypting multimedia objects like images have been developed. These techniques make use of the fact that the data comprising multimedia objects like images could in general be seggregated into two disjoint components, namely salient and non-salient. While the former component contributes to the perceptual qual...
The problem of protecting data and information originates from the dependency upon encryption and st...
Abstract — Nowadays there is development in the multimedia and network technologies. That’s why the ...
Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular stream-encr...
Conventional encryption techniques are usually applicable for text data and often unsuited for encry...
An increasing demand of secure data transmission over internet leads to the challenge of implementin...
[[abstract]]Alexopoulos, Bourbakis and Ioannou proposed two cryptographic schemes for encrypting 2-D...
Protecting digital data, especially digital images, from unauthorized access and malicious activitie...
Digital images are an important aspect of multimedia communication in today's data transmission envi...
In this paper a number of image encryption algorithms based on chaotic maps has been proposed. Image...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
This paper proposes an image encryption scheme based on chaotic maps. In this method, the dynamical...
In this paper, a new encryption scheme with three different modes of operations is proposed based on...
Abstract — Now a day’s rapid increasing growth of internet and multimedia data, security is main pro...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
Digital image processing is exploited in many diverse applications but the size of digital images pl...
The problem of protecting data and information originates from the dependency upon encryption and st...
Abstract — Nowadays there is development in the multimedia and network technologies. That’s why the ...
Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular stream-encr...
Conventional encryption techniques are usually applicable for text data and often unsuited for encry...
An increasing demand of secure data transmission over internet leads to the challenge of implementin...
[[abstract]]Alexopoulos, Bourbakis and Ioannou proposed two cryptographic schemes for encrypting 2-D...
Protecting digital data, especially digital images, from unauthorized access and malicious activitie...
Digital images are an important aspect of multimedia communication in today's data transmission envi...
In this paper a number of image encryption algorithms based on chaotic maps has been proposed. Image...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
This paper proposes an image encryption scheme based on chaotic maps. In this method, the dynamical...
In this paper, a new encryption scheme with three different modes of operations is proposed based on...
Abstract — Now a day’s rapid increasing growth of internet and multimedia data, security is main pro...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
Digital image processing is exploited in many diverse applications but the size of digital images pl...
The problem of protecting data and information originates from the dependency upon encryption and st...
Abstract — Nowadays there is development in the multimedia and network technologies. That’s why the ...
Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular stream-encr...