2018
DOI: 10.1007/s13369-018-3104-7
|View full text |Cite
|
Sign up to set email alerts
|

Visually Meaningful Multi-image Encryption Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(11 citation statements)
references
References 30 publications
0
11
0
Order By: Relevance
“…After all, the control parameters of the system are too few, and the key space is relatively small [14]. To solve these problems, some HD chaotic systems with complex dynamic characteristics have appeared, such as the Lorentz system [15], Chen system [16] and Bao system [17]. These HD chaotic systems can effectively suppress common attacks.…”
Section: Introductionmentioning
confidence: 99%
“…After all, the control parameters of the system are too few, and the key space is relatively small [14]. To solve these problems, some HD chaotic systems with complex dynamic characteristics have appeared, such as the Lorentz system [15], Chen system [16] and Bao system [17]. These HD chaotic systems can effectively suppress common attacks.…”
Section: Introductionmentioning
confidence: 99%
“…A method similar to this has been studied in [25]. In another method, studied in [26], the location of the image pixels is changed by using the Arnold's cat transform and then the image is hidden. One advantage of this method is that if a portion of the image is lost, the adjacent areas in the recycled image are not simultaneously destroyed.…”
Section: Introductionmentioning
confidence: 99%
“…Based on it, many visually meaningful image encryption algorithms have been proposed. [29][30][31][32][33][34][35][36][37] For example, in Reference 29, a CS based visually meaningful image encryption algorithm was proposed. DWT is first taken on the plain image to get its wavelet coefficients.…”
Section: Introductionmentioning
confidence: 99%
“…Compared with traditional image encryption algorithm, this encryption framework can hide effectively the existence of the secret plain image, making it impossible for attackers to distinguish them from natural images. Based on it, many visually meaningful image encryption algorithms have been proposed 29‐37 . For example, in Reference 29, a CS based visually meaningful image encryption algorithm was proposed.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation