2014
DOI: 10.1016/j.sigpro.2013.07.020
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption based on the fractional Fourier transform over finite fields

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0
4

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 85 publications
(25 citation statements)
references
References 16 publications
0
21
0
4
Order By: Relevance
“…Image encryption techniques can be categorized into: 1) Frequency based image encryption and 2) Spatial based image encryption. Hence, using secret key, the frequency based image encryption algorithms are developed to transform image content in the frequency domain such as the Discrete Cosine Transform (DCT) [16], Discrete fractional Fourier Transform (DFFRT) [17], [18], Quantum Fourier Transform (QFT) [19], Fresnel transform [20], Hartley Transform [21] and Gyrator Transform [22].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Image encryption techniques can be categorized into: 1) Frequency based image encryption and 2) Spatial based image encryption. Hence, using secret key, the frequency based image encryption algorithms are developed to transform image content in the frequency domain such as the Discrete Cosine Transform (DCT) [16], Discrete fractional Fourier Transform (DFFRT) [17], [18], Quantum Fourier Transform (QFT) [19], Fresnel transform [20], Hartley Transform [21] and Gyrator Transform [22].…”
Section: Related Workmentioning
confidence: 99%
“…Their method is robust of noise addition and the errors in the secret keys, which employed through decryption steps. Similarly, Lima et al [18] divided grayscale image into blocks with size 8  8 pixels. The image blocks were encrypted with a secret key based on Galois Field Fractional Fourier Transform (GFFFT).…”
Section: Related Workmentioning
confidence: 99%
“…Bigger the UACI is, the better our method resist the differential attack. They are defined as follow formula (22)(23): …”
Section: Differential Attackmentioning
confidence: 99%
“…In this section, our proposed method is compared with the Image encryption based on the finite field cosine transform [22], Image encryption based on the fractional Fourier transform over finite fields [23], Image encryption process based on chaotic synchronization phenomena [24]. The image -Lena‖ and -Camera‖ have been adopted to compare performance when using different algorithms.…”
Section: Comparisonmentioning
confidence: 99%
“…The main idea of the transform domain-based image encryption is that the digital image is operated in the transform domain. Then the pretreated information is encrypted by using other techniques especially chaos [10,11]. The pretreatment techniques include fractional Fourier transform (FRT), Discrete Wavelet Transform (DWT), and so on.…”
Section: Introductionmentioning
confidence: 99%