2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) 2022
DOI: 10.1109/upcon56432.2022.9986385
|View full text |Cite
|
Sign up to set email alerts
|

Batch Image Encryption and Compression using Chaotic Map Infused Autoencoder Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…To protect security and privacy for digital images, previous studies [12][13][14][15][16][17][18][19][20][21] have designed the symmetric cryptography scheme to perform permutation, substitution, or shift operations for the encryption and decryption tasks, such as the permutation method (PM), the diffusion method (DM), or the combination of both methods, which have been used for digital signals and images encryption processes. In the PM-based encryption algorithms, the Arnold map and one-dimensional (1D) and multi-dimensional chaotic maps [12][13][14][15][16][17]19,[22][23][24] are well-known cryptography schemes to support symmetrical encryption processes. The Arnold map, as a scrambling operator, uses the Arnold transform [12][13][14][15]25] to produce pseudorandom sequence numbers to rearrange the image pixel matrix, which randomly permutates the image pixel positions for producing a shuffled image; moreover, its inverse transform is used to decrypt the cipher image.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…To protect security and privacy for digital images, previous studies [12][13][14][15][16][17][18][19][20][21] have designed the symmetric cryptography scheme to perform permutation, substitution, or shift operations for the encryption and decryption tasks, such as the permutation method (PM), the diffusion method (DM), or the combination of both methods, which have been used for digital signals and images encryption processes. In the PM-based encryption algorithms, the Arnold map and one-dimensional (1D) and multi-dimensional chaotic maps [12][13][14][15][16][17]19,[22][23][24] are well-known cryptography schemes to support symmetrical encryption processes. The Arnold map, as a scrambling operator, uses the Arnold transform [12][13][14][15]25] to produce pseudorandom sequence numbers to rearrange the image pixel matrix, which randomly permutates the image pixel positions for producing a shuffled image; moreover, its inverse transform is used to decrypt the cipher image.…”
Section: Introductionmentioning
confidence: 99%
“…In the DM-based encryption algorithms, the 1D and multi-dimensional chaotic maps are used to produce the pseudorandom sequence numbers as secret keys, replacing the image pixel values without rearranging their pixel positions. Their cryptography scheme's secret keys are generated by using the chaotic map functions, as the so-called chaotic key generator (CKG), for image encryption, such as the logistic, sine, cosine, circle, tent, and Chebyshev maps [3,14,17,22,26,27]. Moreover, their scrambling operator can produce oscillation and chaotic behaviors by setting an initial condition and adjusting the control parameters in the specific range with the iteration computations.…”
Section: Introductionmentioning
confidence: 99%