2017
DOI: 10.1007/s13319-017-0137-8
|View full text |Cite
|
Sign up to set email alerts
|

An Asymmetric Image Encryption Based on Phase Truncated Hybrid Transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
2

Relationship

4
5

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 45 publications
0
6
0
Order By: Relevance
“…But still, the recovered images are visible till 25%. Figure 11(a e noise interferes with the ciphered images by relation [80][81][82].…”
Section: Robustness Methods Against Pixels Croppedmentioning
confidence: 99%
“…But still, the recovered images are visible till 25%. Figure 11(a e noise interferes with the ciphered images by relation [80][81][82].…”
Section: Robustness Methods Against Pixels Croppedmentioning
confidence: 99%
“…The entropy H(s) of a message source can be mathematically calculated and written [46][47][48][49] as (16) where s i is the ith image value for L level greyscale image P s i that represents the probability of the symbol s i . ∑ i = 0 L P s i = 1.…”
Section: Entropy Analysismentioning
confidence: 99%
“…To check the strength of the proposed scheme it has been tested against the noise attack by considering multiplicative Gaussian noise in the encrypted images. The interference of multiplicative noise interferes in the encrypted images can be presented through the following relation [45][46][47][48][49]: where δ and δ′ are the encrypted and the noise-affected encrypted amplitude images, respectively, k is a noise factor coefficient which represents the noise strength and G is Gaussian random noise with zero-mean and unit standard deviation. Fig.…”
Section: Noise Attack Analysismentioning
confidence: 99%
“…Asymmetric technique consists of different keys while encryption and decryption of an image and it helps in maintaining the strength of the system. Therefore, many nonlinear encryption methods [28][29][30][31][32][33] have been further suggested. The proposed work deals with enhancing the security of the original DRPE by introducing a rear phase mask operation using random decomposition which helps in adding more security by enhancing the key space.…”
Section: Introductionmentioning
confidence: 99%