2019
DOI: 10.1007/s11042-019-07766-z
|View full text |Cite
|
Sign up to set email alerts
|

An image encryption method based on selective AES coding of wavelet transform and chaotic pixel shuffling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 34 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…6 [(e), (k), (q), (w), (cc), (ii)], while the spectrogram of the corresponding encrypted audio files is shown on Fig. (6) [(f), (l), (r), (x), (dd), (jj)].…”
Section: Spectrogram Analysismentioning
confidence: 99%
“…6 [(e), (k), (q), (w), (cc), (ii)], while the spectrogram of the corresponding encrypted audio files is shown on Fig. (6) [(f), (l), (r), (x), (dd), (jj)].…”
Section: Spectrogram Analysismentioning
confidence: 99%
“…There are many image encryption techniques available for real-time utilization. They are categorized into symmetric (Single key), including Data Encryption Standard(DES), as Gong-bin et al [13], Triple-DES, as mentioned by Mohammad et al [14], Advanced Encryption Standard (AES) as stated by Shakir [15], and asymmetric approaches(Public key) that includes Rivest Shamir Adleman(RSA) based image encryption as discussed by Zhao et al [16]; Alsaffar et al, [17] and Digital Signature Algorithm(DSA) as mention by Xiao Chen and Chun-Jie Hu [18], where the latter category of the image enhancement need two keys that are being generated through the key generator or any other alternative mechanism. There is a significant demand for the secured compression algorithm for exchanging the data over the sensor network with latest networking gateways Dener [19].…”
Section: Introductionmentioning
confidence: 99%
“…It is a good choice to encrypt images by a chaotic system because the chaotic system has high randomness, good ergodicity and sensitivity of initial values, which correspond to avalanche, diffusivity and confusability of cryptography [1]. Therefore, the chaotic system has been widely used in image encryption algorithms [2], [3], [4], [5], [6]. Previous chaotic encryption technologies were mostly based on low-dimensional discrete chaotic maps [7], [8], [9], [10].…”
Section: Introductionmentioning
confidence: 99%