AN EFFICIENT ADAPTIVE ERGODIC MATRIX AND CHAOTIC SYSTEM FOR IMAGE ENCRYPTION

I.A. Ismail, M. Amin, and H. Diab

References

  1. [1] G. Chen, Y. Mao, & C. K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, chaos, Soliton and Fractals 21, 2004, 749–761.
  2. [2] N.K. Pareek, V. Patidar, & K.K. Sud, Image encryption using chaotic logistic map, Image and Vision Computing, 24, 2006, 926–934.
  3. [3] N.G. Bourbakis & C. Alexopoulos, Picture data encryption using SCAN patterns, Pattern Recognition, 25 (6), 1992, 567–581.
  4. [4] C. Alexopoulos, N.G. Bourbakis, & N. Ioannou, Image encryption method using a class of fratcals, Journal of Electronic Imaging, 4 (3), 1995, 251–259.
  5. [5] H.K.C. Chang & J.L. Liu, A linear quadtree compression scheme for image encryption, Signal Processing: Image Communication, 10 (4), 1997, 279–290.
  6. [6] R. Zunino, Fractal circuit layout for spatial decorrelation of images, Electronics Letters, 34 (20), 1998, 1929–1930.
  7. [7] K.L. Chung & L.C. Chang, Large encryption binary images with higher security, Pattern Recognition Letters, 19 (5–6), 1998, 461–468.
  8. [8] J.C. Yen & J.I. Guo, A new chaotic image encryption algorithm, in Proc. (Taiwan) National Symposium on Telecommunications, 1998, 358–362.
  9. [9] J.I. Guo, J.C. Yen, & J.-C. Yeh, The design and realization of a new chaotic image encryption algorithm, in Proc. 1999 Int. Symp. on Communications, 1999, 210–214.
  10. [10] W. Zeng & S. Lei, Efficient frequency domain selective scrambling of digital video, IEEE Transactions on Multimedia, 5 (1), 2003, 118–129.
  11. [11] M.S. Kankanhalli & T.T. Guan, Compressed-domain scrambler/descrambler for digital video, IEEE Transactions on Consuming Eletronics, 48 (2), 2002, 356–365.
  12. [12] X.Y. Zhao & G. Chen, Ergodic matrix in image encryption, Proc. Second International Conference on Image and Graphics, ser. Proc. SPIE, 4875, 2002, 394–401.
  13. [13] X.Y. Zhao, G. Chen, D. Zhang, X.-H. Wang, & G.C. Dong, Decryption of pure-position permutation algorithms, Journal of Zhejiang University SCIENCE, 5 (7), 2004, 803–809.
  14. [14] S. Li, et al., A general cryptanalysis of permutation-only multimedia encryption algorithms, 2004, the preprint is available at http://www.hooklee.com/pub.html
  15. [15] S. Li, G. Chen, & X. Zheng, Chaos-based encryption for digital images and videos, in B. Furht and D. Kirovski (Eds.), Multimedia Security Handbook, (CRC Press, 2004, ch. 4), the preprint at http://www.hooklee.com/pub.html.
  16. [16] S. Li & X. Zheng, On the security of an image encryption method, ICIP2002 2002, the preprint is available http://www.hooklee.com/Papers/ICIP2002.pdf
  17. [17] Z.-H. Guan, F. Huang, & W. Guan, Chaos-based image encryption algorithm, Physics Letter A, 346, 2005, 153–157.
  18. [18] K. Wang, W. Pei, L. Zou, A. Song, & Z. He, On the security of 3D cat map based symmetric image encryption scheme, Physics Letter A, 343, 2005, 432–439.

Important Links:

Go Back