2017
DOI: 10.1155/2017/7367518
|View full text |Cite
|
Sign up to set email alerts
|

Two-Phase Image Encryption Scheme Based on FFCT and Fractals

Abstract: This paper blends the ideas from recent researches into a simple, yet efficient image encryption scheme for colored images. It is based on the finite field cosine transform (FFCT) and symmetric-key cryptography. The FFCT is used to scramble the image yielding an image with a uniform histogram. The FFCT has been chosen as it works with integers modulo p and hence avoids numerical inaccuracies inherent to other transforms. Fractals are used as a source of randomness to generate a one-time-pad keystream to be emp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…They may be classified as spatial domain techniques (Zhang and Xiao, 2014) or frequency domain techniques. In the second class of techniques, both the finite field cosine transform (FFCT) (Lima et al, 2013;Mikhail et al, 2017), and the discrete fractional random transform (DFRNT) (Guo et al, 2010) have been successfully applied in image encryption. Spatial domain techniques are generally more computationally efficient compared to frequency domain techniques.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…They may be classified as spatial domain techniques (Zhang and Xiao, 2014) or frequency domain techniques. In the second class of techniques, both the finite field cosine transform (FFCT) (Lima et al, 2013;Mikhail et al, 2017), and the discrete fractional random transform (DFRNT) (Guo et al, 2010) have been successfully applied in image encryption. Spatial domain techniques are generally more computationally efficient compared to frequency domain techniques.…”
Section: Related Workmentioning
confidence: 99%
“…An image enciphering scheme is either a stream cipher or block cipher. In block ciphers, the plaintext is divided into blocks of a fixed size and the encryption function is applied to each block (Mikhail et al, 2017;Ahmad and Alam, 2009). Various modes of chaining the blocks can be used to achieve different tradeoffs among error propagation, security and parallel processing of the blocks.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The fractals generate infinitely complex patterns and show repetition and self-similarity at different scales. It is the repeating process of images and is familiar patterns since the whole universe consists of fractals in different forms [30][31][32][33][34][35][36][37][38][39][40][41][42][43]. In this context, we have designed a cryptosystem based on shuffling with Julia set of fractals key and chaos theory.…”
mentioning
confidence: 99%