Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
The Design of Rijndael
Challenge-response-based biometric image scrambling for secure personal identification
Future Generation Computer Systems
A novel colour image encryption algorithm based on chaos
Signal Processing
Partial encryption of compressed images and videos
IEEE Transactions on Signal Processing
On the Unequal Error Protection for Progressive Image Transmission
IEEE Transactions on Image Processing
A new, fast, and efficient image codec based on set partitioning in hierarchical trees
IEEE Transactions on Circuits and Systems for Video Technology
Embedded color image coding using SPIHT with partially linked spatial orientation trees
IEEE Transactions on Circuits and Systems for Video Technology
Privacy Protected Surveillance Using Secure Visual Object Coding
IEEE Transactions on Circuits and Systems for Video Technology
Concatenated Block Codes for Unequal Error Protection of Embedded Bit Streams
IEEE Transactions on Image Processing
A new 1D chaotic system for image encryption
Signal Processing
Sharper Symmetric Self-Hilbertian wavelets
Signal Processing
Hi-index | 0.08 |
An embedded partial encryption technique of compressed color images based on chaos is proposed. Modifying the bit values of different types which are obtained by Color-SPIHT (CSPIHT) compression algorithm leads to varying degradation degree of retrieved images. This signifies that the six bit types have various contributions to decoding. As long as the most important bits that have the greatest contribution are encrypted, we can ensure no information leaking out and minimal computation. The piecewise linear chaotic map (PWLCM) is appropriate for generating random number sequence used in proposed cryptosystem for its perfect ergodicity and confusion. Thorough performance and security analysis as regards to diverse evaluation metrics ascertains that the scheme has less computational amount than 0.49%, resists against common cryptanalytic attacks, and preserves the scalability property of the encoder.