2014
DOI: 10.5815/ijcnis.2014.10.01
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Encryption-Compression Scheme Based on Multiple Parameter Discrete Fractional Fourier Transform with Eigen Vector Decomposition Algorithm

Abstract: Abstract-Encryption along with compression is the process used to secure any multimedia content processing with minimum data storage and transmission. The transforms plays vital role for optimizing any encryptioncompression systems. Earlier the original information in the existing security system based on the fractional Fourier transform (FRFT) is protected by only a certain order of FRFT. In this article, a novel method for encryption-compression scheme based on multiple parameters of discrete fractional Four… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 49 publications
0
4
0
Order By: Relevance
“…Using the concept of fractional Fourier transform with Eigen vector decomposition algorithm, Deepak Sharma, Rajiv Saxena and Ashutosh Rajput presented a robust image encryption scheme [7]. In this scheme DFrFT was used with the double random phase encoding.…”
Section: Literature Surveymentioning
confidence: 99%
“…Using the concept of fractional Fourier transform with Eigen vector decomposition algorithm, Deepak Sharma, Rajiv Saxena and Ashutosh Rajput presented a robust image encryption scheme [7]. In this scheme DFrFT was used with the double random phase encoding.…”
Section: Literature Surveymentioning
confidence: 99%
“…Sharma et al [7] conducted researches by combining symmetric cryptographic technique using 2D methods Fractional Multiple Parameter Discrete Fourier Transform (MPDFRFT) followed by lossless compression method using zig-zag, Run Length methods, and Huffman encoding. The proposed scheme provides two freeways of data encryption and compression.…”
Section: A Symmetric Cryptography Methods With Losslessmentioning
confidence: 99%
“…Estimated running time for main functionsThe calculated encryption and decryption time for figure 5 are based on equations(17) and(18) which results in values in table12. The value of total_pix based on table 11 is the sum of the values in the number of pixels column that is equal to 2204 and P is 192.…”
mentioning
confidence: 99%