2012 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT) 2012
DOI: 10.1109/setit.2012.6481937
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption with dynamic chaotic Look-Up Table

Abstract: Abstract-In this paper we propose a novel image encryption scheme. The proposed method is based on the chaos theory. Our cryptosystem uses the chaos theory to define a dynamic chaotic Look-Up Table (

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 18 publications
(13 reference statements)
0
1
0
Order By: Relevance
“…Next, we quantify the obtained image representation. At last, we apply the RLE (run length encoding) and Huffman encoding to obtain the compressed image code [22].…”
Section: Jpeg Image Compressionmentioning
confidence: 99%
“…Next, we quantify the obtained image representation. At last, we apply the RLE (run length encoding) and Huffman encoding to obtain the compressed image code [22].…”
Section: Jpeg Image Compressionmentioning
confidence: 99%
“…Furthermore, the more complex metrics rely on the human visual system features including the multichannel decomposition, contrast sensitivity function, contrast/luminance masking. Generally, several 3D mesh quality evaluation metrics deliberate directly the 2D (Abdmouleh & Khalfallah & Bouhlel, 2012) image metrics (Namara & Mania & Banks & Healey, 2010). Limb (Limb, 1979) concerned with fitting an objective measure to closely estimate the deficiency ratings on five test images.…”
Section: Related Workmentioning
confidence: 99%