2008
DOI: 10.1117/12.766591
|View full text |Cite
|
Sign up to set email alerts
|

Two Fibonacci P-code based image scrambling algorithms

Abstract: Image scrambling is used to make images visually unrecognizable such that unauthorized users have difficulty decoding the scrambled image to access the original image. This article presents two new image scrambling algorithms based on Fibonacci p-code, a parametric sequence. The first algorithm works in spatial domain and the second in frequency domain (including JPEG domain). A parameter, p, is used as a security-key and has many possible choices to guarantee the high security of the scrambled images. The pre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 4 publications
(1 reference statement)
0
14
0
Order By: Relevance
“…3(b) is decomposed into two 60×60 square images called P1 (by using the 1st to 60th rows) and P2 (by using the 37th to 96th rows) for the Arnold transformation [17]. For the p-Fibonacci transformation [18], the parameter p is set as 2, and the parameters for the column and row transformations are set as 3 and 1, respectively. For t≥3, the δ p values in Fig.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…3(b) is decomposed into two 60×60 square images called P1 (by using the 1st to 60th rows) and P2 (by using the 37th to 96th rows) for the Arnold transformation [17]. For the p-Fibonacci transformation [18], the parameter p is set as 2, and the parameters for the column and row transformations are set as 3 and 1, respectively. For t≥3, the δ p values in Fig.…”
Section: Discussionmentioning
confidence: 99%
“…The Hilbert curve method [1], the Arnold transform method [2], the p-Fibonacci transform method [3], the cellular automata method [4], the chaotic sequence method [5], the magic-square scrambling method [6], and the pixel scrambling method [7] are some examples of the image scrambling technology. Among them, the magic-square scrambling method is one of the methods with both easy-encoding and easy-decoding features.…”
Section: Introductionmentioning
confidence: 99%
“…To be convinced of this fact, it is enough to consider the first 32 numbers for this sequence, which are 1, 1, 2, 3, 3,4,5,6,6,7,8,8,9,10,10,11,12,12,13,14,15,15,16,17,17,18,19,19,20,21,22,22, . .…”
Section: Steps: 2-in-4mentioning
confidence: 99%
“…Two new image encryption approaches are proposed in [6], one is based on spatial domain and the other on frequency domain. The proposed approach uses Fibonacci P-code, a parametric sequence.…”
Section: Introductionmentioning
confidence: 99%