Transforms and Fast Algorithms for Signal Analysis and Representations
Transforms and Fast Algorithms for Signal Analysis and Representations
Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transform
Proceedings of the 44th annual Southeast regional conference
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Image scrambling encryption algorithm of pixel bit based on chaos map
Pattern Recognition Letters
Steganography in Digital Media: Principles, Algorithms, and Applications
Steganography in Digital Media: Principles, Algorithms, and Applications
A new chaos-based fast image encryption algorithm
Applied Soft Computing
A chaos-based joint image compression and encryption scheme using DCT and SHA-1
Applied Soft Computing
The fractional Fourier transform over finite fields
Signal Processing
Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision)
Visual Cryptography and Secret Image Sharing (Digital Imaging and Computer Vision)
Finite field trigonometric transforms
Applicable Algebra in Engineering, Communication and Computing
Fast algorithms for the discrete cosine transform
IEEE Transactions on Signal Processing
Video filtering with Fermat number theoretic transforms using residue number system
IEEE Transactions on Circuits and Systems for Video Technology
Security analysis of image cryptosystems only or partially based on a chaotic permutation
Journal of Systems and Software
Histogram Uniformization for Digital Image Encryption
SIBGRAPI '12 Proceedings of the 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images
Hi-index | 0.00 |
In this paper, a novel image encryption scheme is proposed. The technique involves two steps, where the finite field cosine transform is recursively applied to blocks of a given image. In the first step, the image blocks to be transformed result from the regular partition of subimages of the original image. The transformed subimages are regrouped and an intermediate image is constructed. In the second step, a secret-key determines the positions of the intermediate image blocks to be transformed. Besides complying with the main properties required by image encryption methods, the proposed scheme provides benefits related to computational complexity and encoding of the ciphered-images.