2020
DOI: 10.1007/s11042-020-09125-9
|View full text |Cite
|
Sign up to set email alerts
|

A novel hyper-chaotic image encryption with sparse-representation based compression

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 34 publications
0
7
0
Order By: Relevance
“…Additionally, greater chaotic behaviors are seen in hyper-chaotic systems. Furthermore, a random and dynamic combination of the hybrid hyper-chaotic map is suggested to attain excellent encryption performance [18][19][20].…”
Section: International Journal Of Electrical and Computer Engineering...mentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, greater chaotic behaviors are seen in hyper-chaotic systems. Furthermore, a random and dynamic combination of the hybrid hyper-chaotic map is suggested to attain excellent encryption performance [18][19][20].…”
Section: International Journal Of Electrical and Computer Engineering...mentioning
confidence: 99%
“…Each member may explore a wider region, and TSO can explore globally. The particular mathematical model is presented here: (20) where t rand X is a random search space reference.…”
Section: Spiral Foragingmentioning
confidence: 99%
“…This means that digital images need to be both encrypted and compressed. This approach was followed by many researchers in their research, with particular attention paid to data reduction and confidentiality [18][19][20][21][22][23]. When it comes to achieving encryption and compression of digital files, researchers consider two methods.…”
Section: Related Workmentioning
confidence: 99%
“…1(a) shows the compression process before encryption, which includes compression, encryption and encrypted output. Since compression is done before encryption, the encryption process requires less computational time [9]. In the other scenario, the sender first encrypts the image using a secret key and then compresses it to minimize bandwidth without any information about the secret key [10][11][12].…”
Section: Introductionmentioning
confidence: 99%