2014
DOI: 10.1016/j.ijleo.2014.06.107
|View full text |Cite
|
Sign up to set email alerts
|

Encrypting the compressed image by chaotic map and arithmetic coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 34 publications
0
14
0
Order By: Relevance
“…The NPCR and UACI are defined as follows [ 39 , 40 , 41 ]: where and denotes two different cipher images. These cipher images only have one pixel difference.…”
Section: Experiments and Simulationmentioning
confidence: 99%
“…The NPCR and UACI are defined as follows [ 39 , 40 , 41 ]: where and denotes two different cipher images. These cipher images only have one pixel difference.…”
Section: Experiments and Simulationmentioning
confidence: 99%
“…x n+ (2) In the prediction stage, the even signal is used to estimate the odd signal via multiplication by a forecasting parameter P. The difference between the odd and predicted signals is the high-frequency coefficients, as expressed in Equation 3.…”
Section: Spiht-based Image Compressionmentioning
confidence: 99%
“…In the current era, with the availability of inexpensive capturing devices with high resolution, the rapid growth of image transmission over public networks has raised substantial concern in the fields of secure transmission and the compression of images [1,2].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Only one logistic map can be employed to generate the order that is used to permute watermarking. However, it will generate the security flaw [33,34]. So we employ two logistic maps to structure the architecture in this work.…”
Section: Embedding Watermarkingmentioning
confidence: 99%