Image compression and encryption using tree structures
Pattern Recognition Letters - special issue on pattern recognition in practice V
Large encrypting binary images with higher security
Pattern Recognition Letters
Digital watermarking
Analysis of the Clustering Properties of the Hilbert Space-Filling Curve
IEEE Transactions on Knowledge and Data Engineering
Automatic Identification of Perceptually Important Regions in an Image
ICPR '98 Proceedings of the 14th International Conference on Pattern Recognition-Volume 1 - Volume 1
An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
An Introduction to Cryptography, Second Edition (Discrete Mathematics and Its Applications)
Efficient selective encryption for JPEG 2000 images using private initial table
Pattern Recognition
Multimedia Content Encryption: Techniques and Applications
Multimedia Content Encryption: Techniques and Applications
Overview on selective encryption of image and video: challenges and perspectives
EURASIP Journal on Information Security
Partial encryption of compressed images and videos
IEEE Transactions on Signal Processing
Matrix factorizations for reversible integer mapping
IEEE Transactions on Signal Processing
Discrete fractional wavelet transform and its application to multiple encryption
Information Sciences: an International Journal
A new 1D chaotic system for image encryption
Signal Processing
Image cryptographic algorithm based on the Haar wavelet transform
Information Sciences: an International Journal
Hi-index | 0.00 |
In this paper, an efficient yet simple selective encryption technique is proposed based on Saw-Tooth space filling curve, pixels of interest, non-linear chaotic map and singular value decomposition. The core idea of the proposed scheme is to scramble the pixel positions by the means of Saw-Tooth space filling curve followed by the selection of significant pixels using pixels of interest method. Then the diffusion process is done on the significant pixels using a secret image key obtained from non-linear chaotic map and singular value decomposition. Finally, a reliable decryption process is proposed to construct original image from the encrypted image. The analysis and experimental results show that the proposed scheme can achieve various purposes of selective encryption and is computationally secure.