2018
DOI: 10.1016/j.optlaseng.2017.10.023
|View full text |Cite
|
Sign up to set email alerts
|

Multiple-image encryption via lifting wavelet transform and XOR operation based on compressive ghost imaging scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 85 publications
(35 citation statements)
references
References 38 publications
0
28
0
Order By: Relevance
“…However, References [7,8] adopt the classical substitution-permutation network, which are similar to the proposed algorithm. Although the algorithms in References [9][10][11][12][13][14][15] are MIE algorithms, these MIE algorithms are designed with the features of optical images, which are not suitable for encrypting digital images. Therefore, this paper compares the proposed algorithm with the algorithms in References [7,8,[16][17][18][19][20][21].…”
Section: Existing Similar Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…However, References [7,8] adopt the classical substitution-permutation network, which are similar to the proposed algorithm. Although the algorithms in References [9][10][11][12][13][14][15] are MIE algorithms, these MIE algorithms are designed with the features of optical images, which are not suitable for encrypting digital images. Therefore, this paper compares the proposed algorithm with the algorithms in References [7,8,[16][17][18][19][20][21].…”
Section: Existing Similar Algorithmsmentioning
confidence: 99%
“…Zhang et al presented an MIE algorithm with compressive sensing [12]. Li et al designed an MIE algorithm with the lifting wavelet transform [13]. Deng et al presented an MIE algorithm with the Fourier transform [14].…”
Section: Introductionmentioning
confidence: 99%
“…Many solo image encryption schemes were proposed by researchers to address the multiple-image encryption algorithms. The most widely used image encryption algorithms encompass chaotic-based image encryption [5][6][7][8][9], image encryption in the transform domain [10][11][12][13], DNA-based image encryption [14,15], and evolutionary-based image encryption [16].…”
Section: Introductionmentioning
confidence: 99%
“…A multiple-image encryption algorithm based on spectral cropping and spatial multiplexing was presented in [ 15 ]. The authors of [ 16 ] proposed a multiple-image encryption algorithm based on the lifting wavelet transform and the XOR operation based on compressive ghost imaging scheme. Even with this large number of proposed algorithms, some practical problems still exist.…”
Section: Introductionmentioning
confidence: 99%