2004
DOI: 10.1201/9781420038262.ch4
|View full text |Cite
|
Sign up to set email alerts
|

Chaos-Based Encryption for Digital Images and Videos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
51
0

Year Published

2004
2004
2024
2024

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 62 publications
(51 citation statements)
references
References 97 publications
0
51
0
Order By: Relevance
“…Meanwhile, many cryptanalytic results have been reported, leading to the conclusion that a number of multimedia encryption schemes are insecure from the cryptographical point of view. For recent surveys on image and video encryption algorithms, see [3][4][5][6][7], and for surveys on speech encryption, see [6,[8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, many cryptanalytic results have been reported, leading to the conclusion that a number of multimedia encryption schemes are insecure from the cryptographical point of view. For recent surveys on image and video encryption algorithms, see [3][4][5][6][7], and for surveys on speech encryption, see [6,[8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…Encrypting only parts of the image data must be sufficient to satisfy the needed security [8,9]. There are two basic ways to encrypt digital images: in the spatial domain or in the transform domain [10]. Since wavelet based compression appeared and was adopted in the JPEG2000 standard, suggestions for image encryption techniques based in the wavelet domain have been abundant.…”
Section: Introductionmentioning
confidence: 99%
“…The image encryption methods which are based on chaotic systems attract attention due to their effectiveness for digital multimedia encryption whilst exhibiting the required enhanced sensitivity to initial conditions and system parameters (ergodicity and mixing) [1][2][3][4]. Most of the existing chaotic cryptosystems are based on the pixels permutation and the use of the XOR logical function for bit substitution [5][6][7][8][9][10][11]. In the Xiang [12] algorithm for example, blocks of bits are circularly shifted and the number of bits to be shifted is randomly determined by the chaotic value obtained from a logistic map after 70 iterations.…”
Section: Introductionmentioning
confidence: 99%