2014
DOI: 10.1016/j.ins.2014.02.004
|View full text |Cite
|
Sign up to set email alerts
|

Image cryptographic algorithm based on the Haar wavelet transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
32
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 92 publications
(32 citation statements)
references
References 26 publications
0
32
0
Order By: Relevance
“…For an optimal estimation, S k represents the intensity of the image, k represents the decomposed layer, and A k represents the range of the image in layer k. The combination of the FMW and the NE-LML filter allows the detection of appropriate areas to embed information in order to obtain the stego-image. [29].…”
Section: Estimation Of Noise Standardmentioning
confidence: 99%
“…For an optimal estimation, S k represents the intensity of the image, k represents the decomposed layer, and A k represents the range of the image in layer k. The combination of the FMW and the NE-LML filter allows the detection of appropriate areas to embed information in order to obtain the stego-image. [29].…”
Section: Estimation Of Noise Standardmentioning
confidence: 99%
“…Hence, the Haar wavelet transform is used less in cryptography. Researchers usually use of the Haar wavelet in cryptography based on the hybrid methods [25,26,27]. Here, we propose a new method which can improve this problem.…”
Section:  New Perspective Of Haar Wavelet Transformmentioning
confidence: 99%
“…Multiscale processing algorithm is an effective tool to represent the phenomena occurred at different scales, see [23,25,5,11,12,17,42,18,28,19,6,7,32,43,29,30,26]. The http://dx.doi.org/10.1016/j.ins.2014.…”
Section: Introductionmentioning
confidence: 99%
“…Zhao, Y. Jia / Information Sciences 296 (2015)[25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41] …”
mentioning
confidence: 99%