2014
DOI: 10.5120/18126-9198
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Image Encryption Method with Z-Ordering based Scan and Random Number

Abstract: Information security has become an important issue for data storage and transmission due to growth of communication development and exchange of sensitive information through Internet. The services like confidentiality, integrity, and digital signature are required to protect data against unauthorized modification and misuse by anti social elements. Image encryption is widely used in multimedia, medical imaging, telemedicine and military communications to provide confidentiality service. A novel and simple imag… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 15 publications
0
1
0
Order By: Relevance
“…In 2014, T.Sivakumar suggested an image encryption scheme using random nonce and z-order bend to enhance the security level of images. This scheme achieves a certain security level due to the addition of noise during the process, and thus, this system can withstand differential and statistical attacks [24]. Seyed mohammad et.al suggested the algorithm is to use one half of image data for encryption of the other half of the image reciprocally that is based on hash function [6].…”
Section: Literature Surveymentioning
confidence: 99%
“…In 2014, T.Sivakumar suggested an image encryption scheme using random nonce and z-order bend to enhance the security level of images. This scheme achieves a certain security level due to the addition of noise during the process, and thus, this system can withstand differential and statistical attacks [24]. Seyed mohammad et.al suggested the algorithm is to use one half of image data for encryption of the other half of the image reciprocally that is based on hash function [6].…”
Section: Literature Surveymentioning
confidence: 99%
“…Image encryption algorithms based on permutation can typically be categorized into three types: position permutation [8], pixel permutation [9] and block permutation [10]. Compared with chaotic mapping algorithms, these types of algorithms have higher efficiency but tend to underperform in terms of security.…”
Section: Introductionmentioning
confidence: 99%