Depending on applications and specific security requirements, digital images can either be fully or partially encrypted. Partial encryption is one of the methods that reduces computational and processing cost. To achieve partial encryption, chaotic maps in combination with different transforms, like the Wavelet Transform (WT), Discrete Cosine Transform (DCT) and Lifting Wavelet Transform (LWT) are often used. Due to higher efficiency and fast processing, LWT is preferred over wavelet transform. In this paper, a novel partial image encryption scheme based on LWT, Secure Hash Algorithm (SHA-512), Logistic-sine chaotic map, TD-ERCS chaotic map and Substitution Box (S-Box) is presented. In comparison to other schemes, the proposed encryption te...
The process of encoding any given piece of information or data using a particular selection of avail...
Privacy is a serious concern related to sharing videos or images among people over the Internet. As ...
Over the past few years, there has been a rise in the utilization of chaotic encryption algorithms f...
Over the past few years, there has been a rise in the utilization of chaotic encryption algorithms f...
Chaos-based encryption algorithms offer many advantages over conventional cryptographic algorithms, ...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
Abstract- Digital image scrambling is to transform a digital image, to make it unrecognizable and be...
Visual selective image encryption can both improve the efficiency of the image encryption algorithm a...
Multimedia security has become extremely important with the extensive use of multimedia data over th...
With the rapid development of network technology, more and more digital images are transmitted on th...
Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or env...
With an immense increase in Internet multimedia applications over the past few years, digital conten...
Chaotic-maps-based image encryption methods have been a topic of research interest for a decade. How...
Due to social networks, demand for sharing multimedia data is significantly increased in last decade...
The process of encoding any given piece of information or data using a particular selection of avail...
Privacy is a serious concern related to sharing videos or images among people over the Internet. As ...
Over the past few years, there has been a rise in the utilization of chaotic encryption algorithms f...
Over the past few years, there has been a rise in the utilization of chaotic encryption algorithms f...
Chaos-based encryption algorithms offer many advantages over conventional cryptographic algorithms, ...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
We propose a new and efficient method to develop secure image-encryption techniques. The new algorit...
Abstract- Digital image scrambling is to transform a digital image, to make it unrecognizable and be...
Visual selective image encryption can both improve the efficiency of the image encryption algorithm a...
Multimedia security has become extremely important with the extensive use of multimedia data over th...
With the rapid development of network technology, more and more digital images are transmitted on th...
Wireless Sensor Networks (WSN) is widely deployed in monitoring of some physical activity and/or env...
With an immense increase in Internet multimedia applications over the past few years, digital conten...
Chaotic-maps-based image encryption methods have been a topic of research interest for a decade. How...
Due to social networks, demand for sharing multimedia data is significantly increased in last decade...
The process of encoding any given piece of information or data using a particular selection of avail...
Privacy is a serious concern related to sharing videos or images among people over the Internet. As ...
Over the past few years, there has been a rise in the utilization of chaotic encryption algorithms f...