The proposed method partially and completely encrypts the gray scale Document images. The complete image encryption is also performed to compare the performance with the existing encryption methods. The partial encryption is carried out by segmenting the image using the Quad-tree decomposition method based on the variance of the image block. The image blocks with uniform pixel levels are considered insignificant blocks and others the significant blocks. The pixels in the significant blocks are permuted by using 1D Skew tent chaotic map. The partially encrypted image blocks are further permuted using 2D Henon map to increase the security level and fed as input to complete encryption. The complete encryption is carried out by diffusing the p...
[[abstract]]When the grays of images present a strong contrast, merely encrypting the gray-level of ...
This paper introduces a new image encryption scheme using a mixing technique as a way to encrypt one...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
The proposed method partially and completely encrypts the gray scale Document images. The complete i...
AbstractResearch papers published in recent times have focused towards different kinds of image encr...
In this paper, the idea of partial encoding has been proposed to use for secure encryption of only a...
Multimedia security has become extremely important with the extensive use of multimedia data over th...
Document images containing different types of information are required to be encrypted with differen...
The process of encoding any given piece of information or data using a particular selection of avail...
Depending on applications and specific security requirements, digital images can either be fully or ...
The proposed chaos-based image encryption algorithm consists of four stages: decomposition, shuffle,...
The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited key s...
In this paper, a new image block cipher encryption strategy for gray scale images using a different ...
In this study, we propose an innovative image encryption Techniques based on four different image en...
Abstract:- The proposed technique combines quadtree-based compression and chaotic-encryption, and ca...
[[abstract]]When the grays of images present a strong contrast, merely encrypting the gray-level of ...
This paper introduces a new image encryption scheme using a mixing technique as a way to encrypt one...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...
The proposed method partially and completely encrypts the gray scale Document images. The complete i...
AbstractResearch papers published in recent times have focused towards different kinds of image encr...
In this paper, the idea of partial encoding has been proposed to use for secure encryption of only a...
Multimedia security has become extremely important with the extensive use of multimedia data over th...
Document images containing different types of information are required to be encrypted with differen...
The process of encoding any given piece of information or data using a particular selection of avail...
Depending on applications and specific security requirements, digital images can either be fully or ...
The proposed chaos-based image encryption algorithm consists of four stages: decomposition, shuffle,...
The current algorithm of encrypting images uses low-dimensional chaotic systems with a limited key s...
In this paper, a new image block cipher encryption strategy for gray scale images using a different ...
In this study, we propose an innovative image encryption Techniques based on four different image en...
Abstract:- The proposed technique combines quadtree-based compression and chaotic-encryption, and ca...
[[abstract]]When the grays of images present a strong contrast, merely encrypting the gray-level of ...
This paper introduces a new image encryption scheme using a mixing technique as a way to encrypt one...
Recently, a little research into image encryption has been used on chaotic economic maps. The curren...