Methods for encrypting and decrypting MPEG video data efficiently
MULTIMEDIA '96 Proceedings of the fourth ACM international conference on Multimedia
A new encryption algorithm for image cryptosystems
Journal of Systems and Software
Digital Image Processing (3rd Edition)
Digital Image Processing (3rd Edition)
A symbolic transform attack on lightweight encryption based on wavelet filter parameterization
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
A novel secret image sharing scheme in color images using small shadow images
Information Sciences: an International Journal
An Image Encryption Algorithm Based on Discrete Wavelet Transform and Two Dimension Cat Mapping
NSWCTC '09 Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 02
GRC '10 Proceedings of the 2010 IEEE International Conference on Granular Computing
Probabilistic visual secret sharing schemes for grey-scale images and color images
Information Sciences: an International Journal
Visual multiple secret sharing based upon turning and flipping
Information Sciences: an International Journal
An SVD audio watermarking approach using chaotic encrypted images
Digital Signal Processing
Multi-image encryption by circular random grids
Information Sciences: an International Journal
Selective image encryption based on pixels of interest and singular value decomposition
Digital Signal Processing
Hi-index | 0.07 |
Lossless encryption methods are more applicable than lossy encryption methods when marginal distortion is not tolerable. In this research, the authors propose a novel lossless symmetric key encryption/decryption technique. In the proposed algorithm, the image is transformed into the frequency domain using the Haar wavelet transform, then the image sub-bands are encrypted in a such way that guarantees a secure, reliable, and an unbreakable form. The encryption involves scattering the distinguishable frequency data in the image using a reversible weighting factor amongst the rest of the frequencies. The algorithm is designed to shuffle and reverse the sign of each frequency in the transformed image before the image frequencies are transformed back to the pixel domain. The results show a total deviation in pixel values between the original and encrypted image. The decryption algorithm reverses the encryption process and restores the image to its original form. The proposed algorithm is evaluated using standard security and statistical methods; results show that the proposed work is resistant to most known attacks and more secure than other algorithms in the cryptography domain.