2018
DOI: 10.1016/j.optlastec.2018.01.007
|View full text |Cite
|
Sign up to set email alerts
|

Image compression-encryption algorithms by combining hyper-chaotic system with discrete fractional random transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
30
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 91 publications
(32 citation statements)
references
References 32 publications
0
30
0
Order By: Relevance
“…The SPIHT algorithm involves two coding passes: the sorting pass and the refinement pass. The sorting pass looks for zero trees and sorts significant and insignificant coefficients with respect to a specified threshold, as shown in Equation (5). The refinement pass sends the precision bits of the significant coefficients.…”
Section: Spiht-based Image Compressionmentioning
confidence: 99%
See 2 more Smart Citations
“…The SPIHT algorithm involves two coding passes: the sorting pass and the refinement pass. The sorting pass looks for zero trees and sorts significant and insignificant coefficients with respect to a specified threshold, as shown in Equation (5). The refinement pass sends the precision bits of the significant coefficients.…”
Section: Spiht-based Image Compressionmentioning
confidence: 99%
“…Many encryption algorithms, specifically for digital images, have been proposed to meet the requirements of robust image encryption applications. Among them, the chaos-based encryption algorithms are popular due to several excellent properties, such as ergodicity, randomness, unpredictability, and high sensitivity to initial conditions and various parameters [5][6][7].…”
Section: Image Encryption With Chaotic Mapsmentioning
confidence: 99%
See 1 more Smart Citation
“…On the other hand, the surveillance system generates a huge amount of data that require realtime processing. To deal with computational complexity, some researchers propose several contributions such as video summarization techniques [11,12]. e main task of these techniques is to summarize the most informative parts of video data.…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, the security of the low-dimensional chaotic system is a little weak for its disadvantage of short code period. Researchers pay more attention to more complex chaotic systems, such as the high-dimensional chaotic systems and compound chaotic systems [8][9][10][11][12][13].…”
Section: Introductionmentioning
confidence: 99%