2016
DOI: 10.1080/09500340.2016.1236990
|View full text |Cite
|
Sign up to set email alerts
|

Image encryption scheme based on random fractional discrete cosine transform and dependent scrambling and diffusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(5 citation statements)
references
References 29 publications
0
5
0
Order By: Relevance
“…Moreover, it supplies absolutely competent correlation coefficients for diagonal, vertical, and horizontal cases. [3] 99.629 0.0006 0.0019 0.0021 [24] 99.730 0.0012 0.0151 0.0044 [8] 99.609 -0.0193 -0.0226 -0.0245 [2] 99.620 0.0277 0.0039 0.0172 [13] 99.683 0.0009 0.0025 0.0030 [17] 99.589 0.0003 0.0002 0.0003 [11] 99.690 0.0043 0.0021 0.0042 [25] 93.790 0.0259 0.0232 0.0012 [22] 98.798 0.0007 0.0011 0.0021 Proposed 99.782 0.0004 0.0025 0.0012…”
Section: Resultsmentioning
confidence: 99%
“…Moreover, it supplies absolutely competent correlation coefficients for diagonal, vertical, and horizontal cases. [3] 99.629 0.0006 0.0019 0.0021 [24] 99.730 0.0012 0.0151 0.0044 [8] 99.609 -0.0193 -0.0226 -0.0245 [2] 99.620 0.0277 0.0039 0.0172 [13] 99.683 0.0009 0.0025 0.0030 [17] 99.589 0.0003 0.0002 0.0003 [11] 99.690 0.0043 0.0021 0.0042 [25] 93.790 0.0259 0.0232 0.0012 [22] 98.798 0.0007 0.0011 0.0021 Proposed 99.782 0.0004 0.0025 0.0012…”
Section: Resultsmentioning
confidence: 99%
“…To add to these, there are also discrete fractional Fourier transform (DfrFT), discrete fractional cosine transform (DFrCT), and discrete fractional Sine transform (DFrST). Haar wavelet transform de-correlates the image pixels by decomposing into averaging and differencing components [32].The Hilbert transform exhibits edge enhancing properties and hence finds its use in processing of images and phase observation [33]. Radial Hilbert transform can increases the strength with expanded key space [34].…”
Section: Literature Surveymentioning
confidence: 99%
“…A chaotic system is a type of nonlinear system that has cryptographic characteristics such as pseudo-randomness and initial value sensitivity. In recent years, many image encryption schemes based on chaotic systems have been proposed [14][15][16][17][18][19]. Based on these, a meaningful plain image is converted into a noise-like or texture-like cipher image, and the size of the cipher image is equal to that of the plain image.…”
Section: Introductionmentioning
confidence: 99%