2017
DOI: 10.1504/ijict.2017.084339
|View full text |Cite
|
Sign up to set email alerts
|

Secure image encryption scheme based on polar decomposition and chaotic map

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 33 publications
0
6
0
Order By: Relevance
“…The polar decomposition (PD) [76][77][78][79] is a process of decomposing a system into linearly independent factors. The PD of an image, A(x, y), of the size M × N, is given in Equation (30).…”
Section: Polar Decompositionmentioning
confidence: 99%
“…The polar decomposition (PD) [76][77][78][79] is a process of decomposing a system into linearly independent factors. The PD of an image, A(x, y), of the size M × N, is given in Equation (30).…”
Section: Polar Decompositionmentioning
confidence: 99%
“…In linear algebra, polar decomposition is used to factorize the matrices into a set of linearly independent parts, including one rotational matrix and two symmetric ones [42,43]. The polar decomposition of a two-dimensional image, I(x, y), of size M × N is as follows:…”
Section: Polar Decomposition (Pd)mentioning
confidence: 99%
“…In linear algebra, PD involves factorizing the matrices into linearly independent factors [44][45][46]. PD of a matrix A of size ḿ n can be written as:…”
Section: Polar Decomposition (Pd)mentioning
confidence: 99%