2010
DOI: 10.1109/tcsvt.2009.2031514
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic Scan: A Low Complexity Video Transmission System for Efficiently Sending Relevant Image Features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…As discussed in [11] the mask vector can be optimized to maximize the period of the operating cycle as required in certain specialized application (when the PRNG acts as a chaotic counter) [13] but for the purpose of good PRNG arbitrary mask vectors can be chosen (representing part of the key, along with initial register states and cell/rule functions). The architecture of the HCA and its simplified notation are given in Fig.…”
Section: A Hybrid Cellular Automata (Hca) As Conservative Dynamical mentioning
confidence: 99%
“…As discussed in [11] the mask vector can be optimized to maximize the period of the operating cycle as required in certain specialized application (when the PRNG acts as a chaotic counter) [13] but for the purpose of good PRNG arbitrary mask vectors can be chosen (representing part of the key, along with initial register states and cell/rule functions). The architecture of the HCA and its simplified notation are given in Fig.…”
Section: A Hybrid Cellular Automata (Hca) As Conservative Dynamical mentioning
confidence: 99%
“…with the zero mean and normal distribution. For the Rademacher scheme, using expression (7), and assuming the uniform distribution of the input image as discussed, the maximum measurement amplitude is…”
Section: Dark Currentmentioning
confidence: 99%
“…Using alternate scanning patterns, such as the Z-curve or Hilbert curve [3], followed by quadtree decomposition results in the compressive image acquisition schemes presented in [4], [5], and [6]. The work presented in [7] uses a random scan pattern (chaotic scan) in order to achieve compressive acquisition. These techniques can result in very efficient compression levels of less than 1 bit per pixel.…”
Section: Introductionmentioning
confidence: 99%
“…Among them, the most widely used transform methods are the fractional Fourier transform (FRT), extended FRT, gyrator transform, and Fresnel transform. As some properties of chaos are very similar to those of a secure encryption scheme, such as high sensitivity to initial values and system parameters, chaotic maps have been used to design image encryption schemes [7][8][9][10][11]. Meanwhile, many approaches to analyzing the security levels of existing encryption schemes have been presented [9,[12][13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%