2012
DOI: 10.1016/j.optcom.2012.06.023
|View full text |Cite
|
Sign up to set email alerts
|

Double image encryption based on discrete multiple-parameter fractional Fourier transform and chaotic maps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 61 publications
(30 citation statements)
references
References 30 publications
0
30
0
Order By: Relevance
“…   (6) where M×N are the size of the image, I D (i,j) and I E (i,j) are the values of the decrypted image and the original image at the pixel (i,j), respectively. The NMSE curves of different decrypted image with total number of 9, 16 and 25 are shown in Fig.7.…”
Section: Simulation Results and Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…   (6) where M×N are the size of the image, I D (i,j) and I E (i,j) are the values of the decrypted image and the original image at the pixel (i,j), respectively. The NMSE curves of different decrypted image with total number of 9, 16 and 25 are shown in Fig.7.…”
Section: Simulation Results and Performance Analysismentioning
confidence: 99%
“…The DMPFRFT gives us more choices to represent signals in the fractional Fourier domain with extra freedom provided by vector parameters, and shows improved performance and security in image encryption. So it has been widely applied in image encryption [6]- [9]. In this paper, we propose a novel multiple-image encryption scheme based on DCT and DMPFRFT, which can convert multiple images into one encrypted image.…”
Section: Introductionmentioning
confidence: 99%
“…However the effect of driving parameter µ on NPCR and security should be applied to a large quantity of digital images to make the existing conclusion more convincing. UACI is defined in Equation (6). The outcomes of UACI are listed in Table 2.…”
Section: Npcr (Number Of Pixel Change Rate)mentioning
confidence: 99%
“…The complex signal, multiplied by another chaotic random phase mask, is encrypted by multi-parameter fractional Discrete Fourier Transform (DFT). Parameters in chaotic maps serve as the keys of this encryption scheme [6]. In another study an efficient scheme was applied for embedding the compressed binary watermark logo on a basis of based integer wavelet-based watermarking.…”
Section: Introductionmentioning
confidence: 99%
“…"A" binds with "T" and "G" binds with "C" [17]. We know that every digital image pixel can be expressed by 8bit binary numbers [18]. Because the binary numbers "0" and "1" are complementary, "00" and "11" and "01" and "10" are also complementary.…”
Section: Dna Encoding and Complementarymentioning
confidence: 99%