2012
DOI: 10.1007/s11042-012-1281-z
|View full text |Cite
|
Sign up to set email alerts
|

Image scrambling based on chaotic sequences and Veginère cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…In this section, a review of commonly used protection methods to protect visual privacy is presented. Wagstaff ( Continued on next page Spanos & Maples (1995), Macq & Quisquater (1995), Agi & Gong (1996), Tang (1996), Qiao et al (1997), Zeng & Lei (2003), Yang et al (2004), Boult (2005), Yabuta et al (2005), Yabuta et al (2006), , , Chattopadhyay & Boult (2007), Baaziz et al (2007), Raju et al (2008), Dufaux & Ebrahimi (2008a), Dufaux & Ebrahimi (2008b), Xiangdong et al (2008), Carrillo et al (2010), Dufaux & Ebrahimi (2010), Tong et al (2010), Tong et al (2011), Dufaux (2011), Sohn et al (2011), Pande & Zambreno (2013, Li et al (2013), Ra et al (2013) Redaction: K-same family 7 Newton et al (2005), Gross et al (2006a), Gross et al (2006b), Bitouk et al (2008), Gross et al (2009), De la Hunty et al (2010, Lin et al (2012) Redaction: Object / people removal 22 Kokaram et al (1995), Igehy & Pereira (1997), Masnou & Morel (1998), Morse & Schwartzwald (1998), Efros & Leung (1999)…”
Section: Protection Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, a review of commonly used protection methods to protect visual privacy is presented. Wagstaff ( Continued on next page Spanos & Maples (1995), Macq & Quisquater (1995), Agi & Gong (1996), Tang (1996), Qiao et al (1997), Zeng & Lei (2003), Yang et al (2004), Boult (2005), Yabuta et al (2005), Yabuta et al (2006), , , Chattopadhyay & Boult (2007), Baaziz et al (2007), Raju et al (2008), Dufaux & Ebrahimi (2008a), Dufaux & Ebrahimi (2008b), Xiangdong et al (2008), Carrillo et al (2010), Dufaux & Ebrahimi (2010), Tong et al (2010), Tong et al (2011), Dufaux (2011), Sohn et al (2011), Pande & Zambreno (2013, Li et al (2013), Ra et al (2013) Redaction: K-same family 7 Newton et al (2005), Gross et al (2006a), Gross et al (2006b), Bitouk et al (2008), Gross et al (2009), De la Hunty et al (2010, Lin et al (2012) Redaction: Object / people removal 22 Kokaram et al (1995), Igehy & Pereira (1997), Masnou & Morel (1998), Morse & Schwartzwald (1998), Efros & Leung (1999)…”
Section: Protection Methodsmentioning
confidence: 99%
“…This key can be used to de-scramble the image when necessary. A similar approach that sorts the chaotic sequence as Vigenère cipher is proposed by Li et al (2013). Carrillo et al (2010) proposed an encryption algorithm working in the spatial domain.…”
Section: Encryption Of Videos and Imagesmentioning
confidence: 99%
“…To verify the feasibility of the above known-plaintext attack, a lot of experiments have been carried out under the same key settings as employed in [15,Sec. 4.1].…”
Section: The Proposed Known-plaintext Attackmentioning
confidence: 99%
“…Aims to bypass the intractable dynamical degradation problem, Li et al proposed a novel image encryption algorithm based on a 2D coupled logistic map [15]. Instead of using quantized output sequences of the employed chaotic map, which is a common method employed by most chaotic ciphers, two random sequences are generated by means of sorting the chaotic outputs.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation