31
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Discrete Wavelet Transform and Modified Chaotic Key-based Algorithm for Image Encryption and its VLSI Realization

&
Pages 114-120 | Published online: 01 Sep 2014

References

  • J C Yen, and J I Guo, “A New Chaotic Key–Based Design for Image Encryption and Decryption,” Proc. IEEE International Symposium on Circuits and Systems, May 28–31, Geneva, Switzerland, Vol. 4, pp. 49–52, 2000.
  • N Masuda, and K Aihara, “Cryptosystems with discretized chaotic maps,” IEEE Trans. on Circuits and Systems -I: Fundamental Theory and Applications, Vol. 49, No. 1, p. 28–40, 2002.
  • B Furht, and D Socek. Multimedia security: Encryptiontechniques. In IEC Comprehensive Report on Information Security, International Engineering Consortium, Chicago, IL, p 335–49, 2004.
  • S Li, G Chen, and X Zheng. Chaos-based encryption for digital images and videos, in B. Furht and D. Kirovski (Eds.), Multimedia Security Handbook, Vol. 4 of Internet and Communications Series, Ch. 3, CRC Press, United States, Dec. 2004.
  • D Socek, S Li, S S Magliveras, and B Furht, “Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption,” Proc. IEEE First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005. Secure Comm 2005, Sep. 2005.
  • S Li, and X Zheng, “Cryptanalysis of a Chaotic Image Encryption Method”, ISCAS 2002, Vol. 2, pp. 708–11, 2002.
  • K Deergha Rao, and Ch Gangadhar, “Modified chaotic key-based algorithm for image encryption and its VLSI realization” IEEE International Conference on Digital Signal Processing (DSP-2007), Cardiff, Wales, U.K, pp. 439–442, July 1–4, 2007.
  • K Deergha Rao, and Ch Gangadhar, “VLSI Realization of a Secure Cryptosystem for Image Encryption and Decryption”, IEEE International Conference on Communications and Signal Processing (ICCSP 2011), NIT Calicut, Kerala, India, 10–12, Feb. 2011.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.