2016
DOI: 10.1007/978-3-319-50209-0_39
|View full text |Cite
|
Sign up to set email alerts
|

A New Image Encryption Instant Communication Method Based On Matrix Transformation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…[34] proposed an image processing algorithm based on discrete wavelet transform and multiple chaos. In [35], the Arnold transform is used to encrypt images with high security. [35] is to randomly divide the image into several parts, and then encode each part by Arnold transform to improve security.…”
Section: Introductionmentioning
confidence: 99%
“…[34] proposed an image processing algorithm based on discrete wavelet transform and multiple chaos. In [35], the Arnold transform is used to encrypt images with high security. [35] is to randomly divide the image into several parts, and then encode each part by Arnold transform to improve security.…”
Section: Introductionmentioning
confidence: 99%
“…Based on discrete wavelet transform and multi-chaos, an image algorithm was proposed in [19]. The Arnold transformation has been used to encrypt images with high security in [20]. The idea in [20] depended on splitting the image randomly into several parts, and then, each part was coded by the Arnold transformation to increase the security level.…”
Section: Introductionmentioning
confidence: 99%
“…The Arnold transformation has been used to encrypt images with high security in [20]. The idea in [20] depended on splitting the image randomly into several parts, and then, each part was coded by the Arnold transformation to increase the security level. Adopting the classical confusion-diffusion structure, an image encryption algorithm has been introduced by Hua et al based on a 2D logistic-sine-coupling map [21].…”
Section: Introductionmentioning
confidence: 99%
“…The news channels on a daily basis have several incidents to report about pirates attacking crew and looting the vessel or hijacking a ship, and even causing harm to the crew when their ransom demands are not met by the authorities. The maritime cloud server monitors the sea and collects a large amount of data [2][3][4][5] by USV video monitoring system; we will take timely and effective measures to deal with different situations by analyzing data. At the same time, it can collect information of a special area and obtain important information by this system, and experts can use these information to study whether the area can be expanded and whether there are available resources further.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper, a novel video encryption algorithm (i.e., Improved Hill encryption algorithm) is proposed, according to specific requirements of the wireless video monitoring system and combining with the research progress of video encryption technology. The algorithm combines with the process of video compression and regulates the parameters of the encryption process according to the content of the video image [4], so that the comprehensive performance of the algorithm is optimal for different image information. The results of the experiment are that the algorithm has good performance in the influence of adjacent pixels, and the information entropy of images is smaller than other algorithms.…”
Section: Introductionmentioning
confidence: 99%