2012 Second International Conference on Digital Information and Communication Technology and It's Applications (DICTAP) 2012
DOI: 10.1109/dictap.2012.6215383
|View full text |Cite
|
Sign up to set email alerts
|

A lossless digital encryption system for multimedia using orthogonal transforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…In our proposed experiments, the Singular Value Decomposition (SVD) is applied on each sub image and its dominant features are extracted and stored inside the feature vector. We have compared our approach with three other feature extraction techniques: Discrete Cosine Transform (DCT) [19], Hough Transform (HT) [26], and Malakooti Transform (MT) [27].…”
Section: Feature Extractionmentioning
confidence: 99%
“…In our proposed experiments, the Singular Value Decomposition (SVD) is applied on each sub image and its dominant features are extracted and stored inside the feature vector. We have compared our approach with three other feature extraction techniques: Discrete Cosine Transform (DCT) [19], Hough Transform (HT) [26], and Malakooti Transform (MT) [27].…”
Section: Feature Extractionmentioning
confidence: 99%
“…The process of decryption is also similar to encryption but the inverse of transformation matrix can be obtained via matrix transpose rather than direct inverse calculation. This high speed inverse transformation can decrease the calculation cost ad increase the speed of decryption process [12].…”
Section: International Journal Of Digital Information and Wireless Comentioning
confidence: 99%
“…For this reason the designers of such systems are strongly advised to take advantage of secure transmission protocols which mostly employ symmetric encryption algorithms, e.g., IDEA, DES, 3DES, or AES [1]. In the case of real-time transmissions of visual data such algorithms may be computationally too expensive, in particular for portable devices with battery operation (see [2,3]). It should be noted, however, that visual data have a lower value than, e.g., financial or military ones.…”
Section: Introductionmentioning
confidence: 99%