15
Views
4
CrossRef citations to date
0
Altmetric
Articles

Security of new encryption algorithm for image cryptosystems

Pages 178-187 | Published online: 18 Jul 2013

References

  • ElGamal, T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theory, 1985, 31, 469–472.
  • Rivest, R. L., Shamir, A. and Adleman, L. M. A method for obtaining digital signature and public-key cryptosystems. Commun. ACM, 1978, 21, 120–126.
  • Chang, C. C., Hwang, M. S. and Chen, T. S. A new encryption algorithm for image cryptosystems. J. Syst. Software, 2001, 58, 83–91.
  • Chang, C. and Liu, J. L. An image encryption scheme based on quadtree compression scheme. Proc. Int. Computer Symposium, Taiwan, 1994, 230–237.
  • Chen, T. S., Chang, C. C. and Hwang, M. S. A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process., 1998, 7, 1485–1488.
  • Droogenbroeck, M. Partial encryption of image for real-time applications. Proc. Fourth IEEE Benelux Signal Processing, 2004, 11–15.
  • Cheng, H. and Li, X. Partial encryption of compressed images and videos. IEEE Trans. Signal Process., 2000, 48, 2439–2451.
  • Martin, K., Lukac, R. and Plataniotis, K. N. Efficient encryption of wavelet-based coded color images. Pattern Recognition, 2005, 38, 1111–1115.
  • Yip, K. W. and Ng, T. S. Partial-encryption technique for intellectual property protection of FPGA-based products. IEEE Trans. Cons. Electr., 2000, 46, 183–190.
  • Gersho, A. and Gray, R. M. Vector Quantization and Signal Compression, 1992 (Kluwer Academic, Dordrecht).
  • Linde, Y., Buzo, A. and Gray, R. M. An algorithm for vector quantizer design. IEEE Trans. Commun., 1980, 28, 84–95.
  • Diffie, W and Hellman, M. E. New directions in cryptography. IEEE Trans. Inform. Theory, 1976, 22, 644–654.
  • Petitcolas, F. A., Anderson, R. J. and Kuhn, M. G. Information hiding—a survey. Proc. IEEE, 1999, 87, 1062–1078.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.