2020
DOI: 10.1109/access.2020.3022398
|View full text |Cite
|
Sign up to set email alerts
|

Color Image Compression-Encryption Using Fractional-Order Hyperchaotic System and DNA Coding

Abstract: Recently, many encryption algorithms based on fractional-order chaotic system have been proposed to solve the problem of image encryption. In this paper, we propose a novel color image compression-encryption algorithm based on fractional-order hyperchaotic system and DNA coding. In the data compression stage, the data of R, G, and B channels of the color image are converted to the frequency domain by two-dimensional discrete cosine transform (DCT), and then the amount of encrypted data is reduced by the quanti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(16 citation statements)
references
References 74 publications
0
16
0
Order By: Relevance
“…e multiresolution transformation characteristics of wavelet transform enable the digital multimedia video image to make full use of the visual characteristics of human eyes and retain the detail information of the original image under various resolutions. Suppose that h and g, respectively, represent the low-pass filter and high pass filter of the same wavelet base corresponding to the multimedia video image; C j−1 represents the original digital multimedia video image; C j represents the brightness value of the digital multimedia video image after wavelet transform; d 1 j , d 2 j , and d 3 j represent the edge subimage of digital multimedia video image after wavelet transform [18].…”
Section: Wavelet Transform and Vector Quantization Of Multi-resolutio...mentioning
confidence: 99%
See 1 more Smart Citation
“…e multiresolution transformation characteristics of wavelet transform enable the digital multimedia video image to make full use of the visual characteristics of human eyes and retain the detail information of the original image under various resolutions. Suppose that h and g, respectively, represent the low-pass filter and high pass filter of the same wavelet base corresponding to the multimedia video image; C j−1 represents the original digital multimedia video image; C j represents the brightness value of the digital multimedia video image after wavelet transform; d 1 j , d 2 j , and d 3 j represent the edge subimage of digital multimedia video image after wavelet transform [18].…”
Section: Wavelet Transform and Vector Quantization Of Multi-resolutio...mentioning
confidence: 99%
“…where in, the first item of equation (18) represents that the low-frequency component of the digital multimedia video image is smooth in all directions; the second item represents the smoothing of the low-frequency component of the image in the same direction [22]. Which is mainly used to capture the edge information and contour information of multimedia video multiresolution image.…”
Section: Multiresolution Image Coding Based On Waveletmentioning
confidence: 99%
“…Obviously, it can be seen from Table 4 and Table 5 that the information entropy of the R component, G component and B component of the color ciphertext image exceeds 7.99, which is better than the information entropy of the reference [ 26 ]. The information entropy of the grayscale ciphertext image is also around eight.…”
Section: Simulation Results and Analysismentioning
confidence: 99%
“…Considering only the above equation, the exchange between pixel points (1, j) and (1, q) can be realized through pseudo-random variables a and b. At the same time, ab+1 is regarded as a new random number denoted by a, then Equation (2) becomes as shown in Equation (3).…”
Section: Optimized Arnold Transformationmentioning
confidence: 99%
“…This makes the encryption technology based on text image difficult to meet the needs of image encryption. Therefore, how to ensure that these private images are not attacked and stolen in the transmission process has become a research hotspot [2,3]. This makes more and more cryptographers keen on designing a secure and effective image encryption method.…”
Section: Introductionmentioning
confidence: 99%