28
Views
2
CrossRef citations to date
0
Altmetric
Research Article

An encryption algorithm for grey-scale image based on bit-plane decomposition and diffuse representation

, &
Pages 35-47 | Received 01 Nov 2018, Published online: 02 Feb 2020

References

  • Anane, N., Anane, M., Bessalah, H., Issad, M., and Messaoudi, K. Rsa based encryption decryption of medical images. In Systems Signals and Devices (SSD), 2010 7th International Multi-Conference on (2010), IEEE, pp. 1–4.
  • Bailey, K., and Curran, K. An evaluation of image based steganography methods. Multimedia Tools and Applications 30, 1 (2006), 55–88. doi: 10.1007/s11042-006-0008-4
  • Chung, K.-L., and Chang, L.-C. Large encrypting binary images with higher security. Pattern Recognition Letters 19, 5 (1998), 461–468. doi: 10.1016/S0167-8655(98)00017-8
  • Fu, C., Chen, J.-j., Zou, H., Meng, W.-h., Zhan, Y.-f., and Yu, Y.-w. A chaos-based digital image encryption scheme with an improved diffusion strategy. Optics Express 20, 3 (2012), 2363–2378. doi: 10.1364/OE.20.002363
  • Georgiou, S., and Koukouvinos, C. New visual cryptographic schemes derived from orthogonal and mixed orthogonal arrays. Journal of Discrete Mathematical Sciences and Cryptography 7, 3 (2004), 291–306.
  • Gong, L., Liu, X., Zheng, F., and Zhou, N. Flexible multiple-image encryption algorithm based on log-polar transform and double random phase encoding technique. Journal of Modern Optics 60, 13 (2013), 1074–1082. doi: 10.1080/09500340.2013.831139
  • Hashim, A. T., and Helal, B. H. Measurement of encryption quality of bitmap images with rc6 and two modified version block cipher. Eng. & Tech. Journal 28, 17 (2010), 5603.
  • Houas, A., Mokhtari, Z., Melkemi, K. E., and Boussaad, A. A novel binary image encryption algorithm based on diffuse representation. Engineering Science and Technology, an International Journal 19, 4 (2016), 1887–1894. doi: 10.1016/j.jestch.2016.06.013
  • Jia, W., Wen, F. J., Chow, Y. T., and Zhou, C. Binary image encryption based on interference of two phase-only masks. Applied optics 51, 21 (2012), 5253–5258. doi: 10.1364/AO.51.005253
  • Lin, C.-C., and Tsai, W.-H. Visual cryptography for gray-level images by dithering techniques. Pattern Recognition Letters 24, 1 (2003), 349– 358. doi: 10.1016/S0167-8655(02)00259-3
  • Mokhtari, Z., and Melkemi, K. A new watermarking algorithm based on entropy concept. Acta applicandae mathematicae 116, 1 (2011), 65–69. doi: 10.1007/s10440-011-9629-3
  • Naor, M., and Shamir, A. Visual cryptography. In Workshop on the Theory and Application of Cryptographic Techniques (1994), Springer, pp. 1–12.
  • Praveen, K., Sethumadhavan, M., and Krishnan, R. Visual cryptographic schemes using combined boolean operations. Journal of Discrete Mathematical Sciences and Cryptography 20, 2 (2017), 413–437.
  • Priyadarsini, P. A survey on some applications of graph theory in cryptography. Journal of Discrete Mathematical Sciences and Cryptography 18, 3 (2015), 209–217.
  • Su, Y., Tang, C., Li, B., Qiu, Y., Zheng, T., and Lei, Z. Greyscale image encoding and watermarking based on optical asymmetric cryptog-raphy and variational image decomposition. Journal of Modern Optics (2018), 1–13.
  • Wu, Y., Noonan, J. P., and Agaian, S. Npcr and uaci randomness tests for image encryption. Cyber journals: multidisciplinary journals in science and technology, Journal of Selected Areas in Telecommunications (JSAT) (2011), 31–38.
  • Yan, X., Wang, S., Li, L., El-Latif, A. A. A., Wei, Z., and Niu, X. A new assessment measure of shadow image quality based on error diffusion techniques. J Inf Hiding Multimed Signal Process (JIHMSP) 4, 2 (2013), 118–126.
  • Zhou, N., Wang, Y., and Gong, L. Novel optical image encryption scheme based on fractional mellin transform. Optics communications 284, 13 (2011), 3234–3242. doi: 10.1016/j.optcom.2011.02.065

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.