2021
DOI: 10.1016/j.sigpro.2021.108019
|View full text |Cite
|
Sign up to set email alerts
|

TPE2: Three-Pixel Exact Thumbnail-Preserving Image Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 48 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…In the process of practical application, users must do a good job in the transmission and storage of a single key. If the key is obtained by others, it will directly damage their own information and data security [14]. Mathews and others studied the image fusion algorithm of useful information and camouflage dithering information and verified the expected conclusion that "fusing camouflage dithering information image and useful information image can make the interceptor only intercept camouflage information at a certain interception distance, but not useful information" [15].…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the process of practical application, users must do a good job in the transmission and storage of a single key. If the key is obtained by others, it will directly damage their own information and data security [14]. Mathews and others studied the image fusion algorithm of useful information and camouflage dithering information and verified the expected conclusion that "fusing camouflage dithering information image and useful information image can make the interceptor only intercept camouflage information at a certain interception distance, but not useful information" [15].…”
Section: Literature Reviewmentioning
confidence: 99%
“…(3) Set the bitwise XOR result hx of the dynamic perturbation parameters to 0; (4) Set the row index values g 1 , g 2 used to represent the adopted generators to 0 s; (5) for i � 1 to 32 do (6) hx � bitxor(hx, H i ); (7) end for (8) Calculate the row index values of the generators to be used, let g 1 � (bitxor(hx, IR 1,1 )mod128) + 1, g 2 � (bitxor(g 1 , IR N,N )mod128) + 1; (9) tmp : ,1 � (T : ,1 + DVM g 1 ,(T : ,N +1) + DVM g 2 ,(IR : ,1 +1) )mod256; (10) 8 Complexity values as 2DCS-ETC. And when sampling ratio is greater than 0.6, its image reconstruction quality has obvious advantages.…”
Section: Reconstruction Quality Researchers Often Use Peakmentioning
confidence: 99%
“…Moreover, the growth of the internet and mobile communications demands a secure communication system. Such a system needs to ensure that end user privacy has not been compromised in any way [ 5 ]. To this end, providing a higher level of security and maintaining the quality of data without losing the original image’s parametric properties are equally important.…”
Section: Introductionmentioning
confidence: 99%