2013
DOI: 10.1007/978-81-322-0740-5_122
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach to Partial Image Encryption

Abstract: The traffic of digital images and video has grown rapidly in the internet. Security becomes important for several applications like military image database, confidential video conferencing, medical images, etc. Several techniques have been developed for textual data but are not appropriate for images and video with huge amount of file size. In traditional image and video content protection schemes, called fully layered, the whole content is first compressed. Then, the compressed bitstream is entirely encrypted… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 43 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Furthermore, image size affects the speed of encryption; that is, the higher the compression, the better the efficiency. In [15] proposed a partial image encryption technique involves two methods, the first is by pixel value manipulation and other second is by using SCAN mapping method. From the experimental results we conclude that the proposed image encryption method gives very good results.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, image size affects the speed of encryption; that is, the higher the compression, the better the efficiency. In [15] proposed a partial image encryption technique involves two methods, the first is by pixel value manipulation and other second is by using SCAN mapping method. From the experimental results we conclude that the proposed image encryption method gives very good results.…”
Section: Related Workmentioning
confidence: 99%
“…The S-boxes being the integral static parts of BA reside within the F-function, and the algorithm strengths are primarily determined by their quality [8]. Therefore, the weakness of BA is believed to be overcome by developing an innovative F-function with new dynamic S-box [9,10]. Moreover, sixteen iterations make the processing somewhat intricate with limited key length.…”
Section: Introductionmentioning
confidence: 99%