2018
DOI: 10.1007/978-981-10-8234-4_15
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Multimedia Encryption and Decryption Technique Using Binary Tree Traversal

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…A lot of research was done with different techniques such as hyper-chaos (for instance, see [4,18]); with discrete mathematical models like cellular automata (see in [19][20][21][22][23]), and Substitution, a commonly used method in [12,[24][25][26][27][28]. Further, a good survey on chaos-based cryptography can be found in [29,30].…”
Section: Sine Mapmentioning
confidence: 99%
See 1 more Smart Citation
“…A lot of research was done with different techniques such as hyper-chaos (for instance, see [4,18]); with discrete mathematical models like cellular automata (see in [19][20][21][22][23]), and Substitution, a commonly used method in [12,[24][25][26][27][28]. Further, a good survey on chaos-based cryptography can be found in [29,30].…”
Section: Sine Mapmentioning
confidence: 99%
“…The paper [26] presents us with a unique method of complete encryption and decryption through a binary tree traversal method. As a matter of fact, it uses four block ciphers (a block of data is encrypted at a stretch) using permutation components and bit level substitutions.…”
Section: Substitution Based Encryption Algorithmsmentioning
confidence: 99%
“…In 2017, Priya et al [11] suggested and applied a novel encryption algorithm that focuses on four block ciphers based complete encryption technique. It implements a binary tree traversal for multi-bit word parallelism using substitution and a two-dimensional array to perform a nonlinear diffusion process.…”
Section: Related Workmentioning
confidence: 99%
“…Images and videos can be encrypted using traditional schemes such AES and DES; however, these schemes are not designed for multimedia data encryption [5][6][7]. Conventional encryption schemes have some issues such as higher computational complexity as images contain large amount of data and strong correlation among pixels.…”
Section: Introductionmentioning
confidence: 99%