2014 2nd International Conference on Business and Information Management (ICBIM) 2014
DOI: 10.1109/icbim.2014.6970933
|View full text |Cite
|
Sign up to set email alerts
|

A chaos based partial image encryption scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…is the measurement vector, vec(•) is used to construct the 1D vector, φ ∈ R M 2 ×N 2 represents the measurement matrix. Solar radio spectrogram is used to record the fine structure of solar radio burst and has the characteristics of huge data volume [27][28][29][30]. Therefore, it is necessary to block it and then apply the compressed sensing theory, which is called block compressed sensing.…”
Section: Compressed Sensingmentioning
confidence: 99%
“…is the measurement vector, vec(•) is used to construct the 1D vector, φ ∈ R M 2 ×N 2 represents the measurement matrix. Solar radio spectrogram is used to record the fine structure of solar radio burst and has the characteristics of huge data volume [27][28][29][30]. Therefore, it is necessary to block it and then apply the compressed sensing theory, which is called block compressed sensing.…”
Section: Compressed Sensingmentioning
confidence: 99%
“…In Fig. 4 we can see the result and how the diffusion of the encrypted image appear with its histogram equalization, although this doesn't mean we got the required Unless there are analytical approach, the statistical analysis in this work represented by calculating information entropy to ensure the uniformity of pixels distribution, as well as, NPCR to calculate the percentage of different number of pixels, also we have calculated the UACI for average difference of intensity level [16], finally we have analyzed Correlation Coefficient, this is to measure the quality of pixels pair relocation.…”
Section: Encryption Performance Measurementioning
confidence: 99%
“…where 5-D multi-wing hyper chaotic system enabled to generate key stream and pseudo random numbers.Chaos based expand and shrink techniques [2] applied for image encryption to increase the security. Multiple times of chaos based permutation technique applied to reduce the correlation among the pixels and substitution increases the entropy of encrypted image.Sukalyan Som etc.al [3] presents an chaos based partial image encryption scheme. Plain image decomposed to bit planes.…”
Section: Introductionmentioning
confidence: 99%