2019 UK/ China Emerging Technologies (UCET) 2019
DOI: 10.1109/ucet.2019.8881887
|View full text |Cite
|
Sign up to set email alerts
|

A Partial Ligt-weight Image Encryption Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(36 citation statements)
references
References 16 publications
0
36
0
Order By: Relevance
“…8 (a, c, e, g). The simulation results are contrasted with the algorithms presented in [43], [18] and [33] to prove the efficiency of the scheme proposed in this paper. For demonstration purposes, the image after every stage is shown for the Baboon image only in Fig.…”
Section: Experimental Results and Security Analysismentioning
confidence: 99%
See 4 more Smart Citations
“…8 (a, c, e, g). The simulation results are contrasted with the algorithms presented in [43], [18] and [33] to prove the efficiency of the scheme proposed in this paper. For demonstration purposes, the image after every stage is shown for the Baboon image only in Fig.…”
Section: Experimental Results and Security Analysismentioning
confidence: 99%
“…Lower values of χ2 shows that the pixel distribution is uniform. The chi-square values for the encrypted images are tabulated in Table 4 and are also compared with the schemes proposed in [43], [18] and [33]. It is clear from Table 4 that the encrypted images obtained through the proposed algorithms have uniform pixel distribution and have successfully covered all the data from the hackers.…”
Section: A Histogram and Chi-square Investigationmentioning
confidence: 99%
See 3 more Smart Citations