2012 IEEE International Symposium on Circuits and Systems 2012
DOI: 10.1109/iscas.2012.6272045
|View full text |Cite
|
Sign up to set email alerts
|

Application of chaotic maps for simultaneous lossy image compression and encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Traditionally, the sampled data are first compressed and then encrypted, if necessary. There is an increasing research interest on joint compression and encryption [1][2][3][4][5][6][7][8][9][10] coding and Huffman coding. Wu and Kuo [1] suggested two approaches for integrating encryption with multimedia compression systems, i.e., selective encryption and modified entropy coders with multiple statistical models.…”
Section: A Existing Work On Joint Compression and Encryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…Traditionally, the sampled data are first compressed and then encrypted, if necessary. There is an increasing research interest on joint compression and encryption [1][2][3][4][5][6][7][8][9][10] coding and Huffman coding. Wu and Kuo [1] suggested two approaches for integrating encryption with multimedia compression systems, i.e., selective encryption and modified entropy coders with multiple statistical models.…”
Section: A Existing Work On Joint Compression and Encryptionmentioning
confidence: 99%
“…Traditionally, the sampled data are first compressed and then encrypted, if necessary. There is an increasing research interest on joint compression and encryption [1][2][3][4][5][6][7][8][9][10] mostly by leveraging chaos theory and source coding schemes including arithmetic Manuscript received Mar. 23,2014.…”
Section: A Existing Work On Joint Compression and Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Chaos has aroused a research interest in various fields of cryptography due to its inherent random-like behaviours. In the last 20 years, a large number of cryptographic algorithms based on chaos have been proposed [1][2][3] and digital chaos systems have been employed in most of these cryptosystems. However, when chaos is realized in computers or digital circuits, a chaos system often suffers dynamical degradation, which refers to the short cycle length, non-ergodicity, low linear-complexity and strong correlation.…”
Section: Introductionmentioning
confidence: 99%
“…Encryption and compression in these processes are chronological. So it is a hotspot to study on compressing and encrypting color images simultaneously [10][11][12] . An encrypted compression scheme for color image is proposed to compress color images while encrypting it.…”
Section: Introductionmentioning
confidence: 99%