2009 International Conference on Computer Engineering &Amp; Systems 2009
DOI: 10.1109/icces.2009.5383309
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic image encryption in transform domains

Abstract: This paper presents a new approach for image encryption based on the chaotic Baker map, but in the different transform domains. The discrete cosine transform (DCT), the discrete sine transform (DST), the discrete wavelet transform (DWT) and the additive wavelet transform (AWT) are exploited in the proposed encryption approach. Chaotic encryption is performed in these transform domains to make use of the characteristics of each domain. A comparison study between all transform domain encryption schemes is held i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…After applying m-iteration for confusion and n-iteration for diffusion to each color channel, the three-color channels are combined to get the final encrypted image. The authors of [29] investigated the usage of chaotic mapping with different frequency domains. First, the plainimage is transformed using the chosen transform.…”
Section: Introductionmentioning
confidence: 99%
“…After applying m-iteration for confusion and n-iteration for diffusion to each color channel, the three-color channels are combined to get the final encrypted image. The authors of [29] investigated the usage of chaotic mapping with different frequency domains. First, the plainimage is transformed using the chosen transform.…”
Section: Introductionmentioning
confidence: 99%
“…The DST has proven to be an effective tool in the medical field as well, combining multiple images of different modes into a singular, highly detailed image for more accurate diagnoses [36], [37]. Expansion upon the fractional DST has also broadened the transform's role in the field of cyber security, particularly for applications in image encryption [38]- [40]. It was shown in [38] that the DST increases the entropy of encryption schemes that rely on processing within transform domains.…”
Section: Introductionmentioning
confidence: 99%
“…Expansion upon the fractional DST has also broadened the transform's role in the field of cyber security, particularly for applications in image encryption [38]- [40]. It was shown in [38] that the DST increases the entropy of encryption schemes that rely on processing within transform domains. This paper explores this concept further in Section VIII.…”
Section: Introductionmentioning
confidence: 99%