Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 8
Page No. 2648 - 2654

A Chaotic Image Encryption Method Using a Novel Compression Method for Data Embedding

Authors : AbdulrahmanAlturki

References

Enayatifar, R. and A.H. Abdullah, 2011. Image security via genetic algorithm. Proceedings of the 2011 International Conference on Computer and Software Modeling IPCSIT Vol. 14, May 26, 2011, IACSIT Press, Singapore, pp: 198-203.

Giri, K.J., M.A. Peer and P. Nagabhushan, 2015. A robust color image watermarking scheme using discrete wavelet transformation. I.J. Image Graph. Sign. Proc., 1: 47-52.
CrossRef  |  Direct Link  |  

Kannan, D. and M. Gobi, 2015. An extensive research on robust digital image watermarking techniques: A review. Intl. J. Signal Imaging Syst. Eng., 8: 89-104.
CrossRef  |  Direct Link  |  

Lei, B., X. Zhao, H. Lei, D. Ni and S. Chen et al., 2017. Multipurpose watermarking scheme via intelligent method and chaotic map. Mult. Tools Appl., 1: 1-23.
CrossRef  |  Direct Link  |  

Lima, J.B., F. Madeiro and F.J.R. Sales, 2015. Encryption of medical images based on the cosine number transform. Signal Proc. Image Commun., 35: 1-8.
CrossRef  |  Direct Link  |  

Liu, X., Y. Cao, P. Lu, X. Lu and Y. Li, 2013. Optical image encryption technique based on compressed sensing and Arnold transformation. Opt., 124: 6590-6593.
CrossRef  |  Direct Link  |  

Loan, N.A., N.N. Hurrah, S.A. Parah, J.W. Lee and J.A. Sheikh et al., 2018. Secure and robust digital image watermarking using coefficient differencing and chaotic encryption. IEEE. Access, 6: 19876-19897.
CrossRef  |  Direct Link  |  

Muhammad, K., M. Sajjad, I. Mehmood, S. Rho and S.W. Baik, 2016. A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image. Mult. Tools Appl., 75: 14867-14893.
CrossRef  |  Direct Link  |  

Panchal, U.H. and R. Srivastava, 2015. A comprehensive survey on digital image watermarking techniques. Proceedings of the 5th International Conference on Communication Systems and Network Technologies (CSNT) 2015, April 4-6, 2015, IEEE, Vadodara, India, ISBN:978-1-4799-1798-3, pp: 591-595.

Parah, S.A., F. Ahad, J.A. Sheikh and G.M. Bhat, 2017. Hiding clinical information in medical images: A new high capacity and reversible data hiding technique. J. Biomed. Inform., 66: 214-230.
CrossRef  |  Direct Link  |  

Patel, R. and P. Bhatt, 2015. A review paper on digital watermarking and its techniques. Intl. J. Comput. Appl., 110: 10-13.
Direct Link  |  

Pathak, S., S. Tiwari and S. Agrawal, 2016. Digital image watermarking in wavelet domain using chaotic sequence. Proceedings of the International Conference on Futuristic Trends in Engineering, Science, Humanities and Technology (FTESHT-16), January 23-24, 2016, Institute of Professional Studies, Gwalior, India, ISBN:978-93-85225-55-0, pp: 108-113.

Pawar, M. and J. Agarwal, 2017. A literature survey on security issues of WSN and different types of attacks in network. Indian J. Comput. Sci. Eng., 8: 80-83.
Direct Link  |  

Pawar, M.V. and J. Anuradha, 2015. Network security and types of attacks in network. Proc. Comput. Sci., 48: 503-506.
CrossRef  |  Direct Link  |  

Rahim, T., S. Chae and S.Y. Shin, 2018. A comparative performance analysis of schemes. Proc. Korean Instit. Commun. Inf. Sci., 2018: 227-228.
Direct Link  |  

Razzaq, M.A., M.A. Baig, R.A. Shaikh and A.A. Memon, 2017. Digital image security: Fusion of encryption, steganography and watermarking. Intl. J. Adv. Comput. Sci. Appl., 8: 224-228.
CrossRef  |  Direct Link  |  

Safi, H.W. and A.Y. Maghari, 2017. Image encryption using double chaotic logistic map. Proceedings of the 2017 International Conference on Promising Electronic Technologies (ICPET), October 16-17, 2017, IEEE, Deir El-Balah, Palestine, ISBN:978-1-5386-2270-4, pp: 66-70.

Seyyedtaj, M. and M.A.J. Jamali, 2014. Different types of attacks and detection techniques in mobile Ad Hoc network. Intl. J. Comput. Appl. Technol. Res., 3: 541-546.
Direct Link  |  

Sharma, V.K., D.K. Srivastava and P. Mathur, 2017. A study of steganography based data hiding techniques. Intl. J. Emerging Res. Manage. Technol., 6: 145-150.
Direct Link  |  

Sreedhanya, A.V. and K.P. Soman, 2012. Secrecy of cryptography with compressed sensing. Proceedings of the 2012 International Conference on Advances in Computing and Communications (ICACC), August 9-11, 2012, IEEE, Cochin, Kerala, India, ISBN:978-1-4673-1911-9, pp: 207-210.

Thanh, T.M., K. Tanaka, L.H. Dung, N.T. Tai and H.N. Nam, 2018. Performance analysis of robust watermarking using linear and nonlinear feature matching. Mult. Tools Appl., 77: 2901-2920.
CrossRef  |  Direct Link  |  

Wang, X. and Q. Wang, 2014. A novel image encryption algorithm based on dynamic S-boxes constructed by chaos. Nonlin. Dyn., 75: 567-576.
CrossRef  |  Direct Link  |  

Zhou, S., Q. Zhang and X. Wei, 2010. Image encryption algorithm based on DNA sequences for the big image. Proceedings of the 2010 International Conference on Multimedia Information Networking and Security (MINES), November 4-6, 2010, IEEE, Nanjing, Jiangsu, China, ISBN:978-1-4244-8626-7, pp: 884-888.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved