1 |
Jolly Shah and Vikas Saxena, “Performance Study on Image Encryption Schemes,” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, pp.349-355, July 2011. Artical (CrossRef Link).
|
2 |
Subramania Sudharsanan, “Shared Key Encryption of JPEG Color Images,” IEEE Transactions on Consumer Electronics, Vol. 51, No. 4, pp.1204-1211, November, 2005. Artical (CrossRef Link).
DOI
|
3 |
Yuling Luo, Minghui Du, Dong Liu, "JPEG Image Encryption Algorithm Based on Spatiotemporal Chaos," in Proc. of 2012 Fifth International Workshop on Chaos-fractals Theories and Applications, pp. 191-195. 2012. Article (CrossRef Link).
|
4 |
Qiu Jing and Wang Ping, “Encryption Algorithm for Compressed Image Based on Chaotic Maps,” Computer Science, Vol. 39, No. 6, pp.44-46, June, 2012. Artical (CrossRef Link).
|
5 |
Tang, L., "Methods for encrypting and decrypting MPEG video data efficiently," in Proc. of the Fourth ACM International Conference on Multimedia, pp. 219-229. 1996. Article (CrossRef Link).
|
6 |
Zhang, Dinghui, and Fengdeng Zhang, “Chaotic encryption and decryption of JPEG image,” Optik-International Journal for Light and Electron Optics 125.2, pp.717-720, 2014. Article (CrossRef Link).
DOI
|
7 |
B. K. ShreyamshaKumar and Chidamber R. Patil, “JPEG Image Encryption using Fuzzy PN Sequences,” Signal, Image and Video Processing, Vol. 4, No. 4, pp.419-427, November, 2010. Article (CrossRef Link).
DOI
|
8 |
Zhengxing Qiang, Xinpeng Zhang, Shuozhong Wang, “Reversible Data Hiding in Encrypted JPEG Bitstream,” IEEE Transactions on Multimedia, Vol.16, No.5, pp.1486 – 1491, August, 2014. Article (CrossRef Link).
DOI
|
9 |
SimYing Ong, KokSheik Wong, Xiaojun Qi, Kiyoshi Tanaka, “Beyond format-compliant encryption for JPEG image,” Signal Processing: Image Communication, Volume 31, February, Pages 47-60, 2015. Artical (CrossRef Link).
DOI
|
10 |
Fangchao Wang and Sen Bai, "JPEG Image Encryption by Shuffling DCT Coefficients in Defined Block," in Proc. of Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on , pp.60 - 63, 2013. Article (CrossRef Link).
|
11 |
Lian S, Sun J,Wang Z, “A block cipher based on a suitable use of the chaotic standard map,” Chaos, Solitons &Fractals, 26, 1, pp.117–129, 2005. Article (CrossRef Link)
DOI
|
12 |
Yang L, Yang-yu F, Chong-yang H, “Information hiding technology based on image second scrambling,” Journal of Image and Graphics, Vol.11, No. 8, pp.1088–1091, 2006. Artical (CrossRef Link).
|
13 |
Zeng W, Lei S, “Efficient frequency domain selective scrambling of digital video,” IEEE Trans Multimedia, Vol.5, No.1, pp.118–129, 2003. Article (CrossRef Link).
DOI
|
14 |
Telem, Adelaide Nicole Kengnou, et al., “A Robust Chaotic and Fast Walsh Transform Encryption for Gray Scale Biomedical Image Transmission,” Signal and Image processing: an international journal, volume 6(Issue 3):81-102, 2015. Article (CrossRef Link).
DOI
|
15 |
Padmapriya Praveenkumar, Rengarajan Amirtharajan, K. Thenmozhi and John Bosco Balaguru Rayappan, “Pixel scattering matrix formalism for image encryption—A key scheduled substitution and diffusion approach,” AEU-International Journal of Electronics and Communications, Volume 69, Issue 2, February, pp. 562-572, 2015. Article (CrossRef Link).
DOI
|
16 |
Kishore, B., Shreyamsha Kumar, B. K., Patil, C.R. “FPGA based simple and fast JPEG Encryptor,” Journal of Real-Time Image Processing, 10 (3), pp. 551-559. 2015. Article (CrossRef Link).
DOI
|
17 |
Shanshan Li, Yinghai Zhao, Bayi Qu and Jiang-an Wang “Image scrambling based on chaotic sequences and Veginère cipher,” Multimedia Tools and Application. Vol.66, No.3, pp. 573-588, 2013. Article (CrossRef Link).
DOI
|
18 |
Chong Fu, Jun-jie Chen, Hao Zou, Wei-hong Meng, Yong-feng Zhan and Ya-wen Yu, “A chaos-based digital image encryption scheme with an improved diffusion strategy,” Opetics Express, Vol.20, No.3, pp. 2363-2378, January, 2012. Article (CrossRef Link).
DOI
|
19 |
WEIHAI LI, YUAN YUAN, “A leak and its remedy in JPEG image encryption,” International Journal of Computer Mathematics, Vol. 84, No.9, pp. 1367–1378, September, 2007. Article (CrossRef Link).
DOI
|