2017 International Conference on Signal Processing and Communication (ICSPC) 2017
DOI: 10.1109/cspc.2017.8305898
|View full text |Cite
|
Sign up to set email alerts
|

Multimedia data encryption based on discrete dyadic transformation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…From table 1 it has been noticed that, an average of 99.6089% NPCR and 33.4328% UACI values are achieved which are greater than 99.5876% and 28.2474% respective values from the conventional PHT algorithm [4] due to effective shuffling of pixel values by MPHT compared to conventional PHT. The algorithm takes an average of 0.18 second for encryption process and is less than 0.29 second mentioned in modified Camellia algorithm [7], 1.27 seconds as mentioned in the hybrid chaotic map [8] to encrypt 256X256 images. Time of execution will be more for large sized images.…”
Section: (9)mentioning
confidence: 99%
See 2 more Smart Citations
“…From table 1 it has been noticed that, an average of 99.6089% NPCR and 33.4328% UACI values are achieved which are greater than 99.5876% and 28.2474% respective values from the conventional PHT algorithm [4] due to effective shuffling of pixel values by MPHT compared to conventional PHT. The algorithm takes an average of 0.18 second for encryption process and is less than 0.29 second mentioned in modified Camellia algorithm [7], 1.27 seconds as mentioned in the hybrid chaotic map [8] to encrypt 256X256 images. Time of execution will be more for large sized images.…”
Section: (9)mentioning
confidence: 99%
“…This involves cracking of cryptographic algorithm and decrypting the cipher data. Last resort tactics are also known as brute force attacks [4] [6][7]. The secrete key is subjected for all possible combinations and analyzed in the cryptographic algorithm.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Digital image watermarking (DIW) is an extensively used mutual technique to code multimedia data with an identifier for the purpose of authentication between source and destination [1][2]. Thumping the unique information by a deceptive (cipher) is the foremost feature of information security [3][4][5][6][7]. Digital watermarking can be a very effective tool for information hiding as it is a process of hiding information inside a digital signal [8].…”
Section: Introductionmentioning
confidence: 99%
“…Watermarking is a significant technique in the region of information security [3][4][5][6][7][8][9][10][11][12]. It is one of the important techniques which are used for preservation the genesis of the image by defensive it against piracy [13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%