Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 22
Page No. 8168 - 8179

A New Random Sequence using Descriptor of Fourier for Image Encryption

Authors : N. Benmessaoud, N. Hadj-Said, A. Ali-Pacha and M. Benmessaoud

References

Abugharsa, A.B., A.S.H. Basari and H. Almangush, 2011. A new image encryption approach using block-based on shifted algorithm. Intl. J. Comput. Sci. Netw. Secur., 11: 123-130.
Direct Link  |  

Al-Qaheri, H., A. Mustafi and S. Banerjee, 2010. Digital watermarking using ant colony optimization in fractional Fourier domain. J. Inf. Hiding Multimed. Sign. Proc., 1: 179-189.
Direct Link  |  

Ashutosh, D.S., 2013. Image encryption using discrete Fourier transform and fractional fourier transform. Intl. J. Eng. Adv. Technol., 2: 886-890.
Direct Link  |  

Bu, S. and B.H. Wang, 2004. Improving the security of chaotic encryption by using a simple modulating method. Chaos Solitons Fractals, 19: 919-924.
CrossRef  |  Direct Link  |  

Chee, C.Y., D. Xu and S.R. Bishop, 2004. A zero-crossing approach to uncover the mask by chaotic encryption with periodic modulation. Chaos Solitons Fractals, 21: 1129-1134.
CrossRef  |  Direct Link  |  

Gao, H., Y. Zhang, S. Liang and D. Li, 2006. A new chaotic algorithm for image encryption. Chaos Solitons Fractals, 29: 393-399.

Knuth, D.E., 1981. The Art of Computer Programming: Semi-Numerical Algorithms. 2nd Edn., Pearson Education, London, England, UK., ISBN:9780201038224, Pages: 688.

Kushwaha, J. and B.N. Roy, 2010. Secure image data by double encryption. Intl. J. Comput. Appl., 5: 28-32.
CrossRef  |  Direct Link  |  

Li, S. and X. Zheng, 2002. Cryptanalysis of a chaotic image encryption method. Proceedings of the IEEE International Symposium on Circuits and Systems, May 26 29, 2002, Phoenix-Scottsdale, AZ., USA., pp: 708-711.

Pareek, N.K., V. Patidar and K.K. Sud, 2006. Image encryption using chaotic logistic map. Image Vision Comput., 24: 926-934.
Direct Link  |  

Refregier, P. and B. Javidi, 1995. Optical image encryption based on input plane and Fourier plane random encoding. Opt. Lett., 20: 767-769.
CrossRef  |  PubMed  |  Direct Link  |  

Shannon, C.E., 1949. Communication theory of secrecy systems. Bell Syst. Tech. J., 28: 656-715.
CrossRef  |  Direct Link  |  

Unnikrishnan, G. and K. Singh, 2000. Double random fractional Fourier domain encoding for optical security. Opt. Eng., 39: 2853-2860.
CrossRef  |  Direct Link  |  

Unnikrishnan, G. and K. Singh, 2001. Optical encryption using quadratic phase systems. Opt. Commun., 193: 51-67.
CrossRef  |  Direct Link  |  

Xu, L., Z. Li, J. Li and W. Hua, 2016. A novel bit-level image encryption algorithm based on chaotic maps. Opt. Lasers Eng., 78: 17-25.
CrossRef  |  Direct Link  |  

Younes, M.A.B. and A. Jantan, 2008. An image encryption approach using a combination of permutation technique followed by encryption. Intl. J. Comput. Sci. Netw. Secur., 8: 191-197.
Direct Link  |  

Zhang, D. and G. Lu, 2006. A comparative study on shape retrieval using Fourier descriptors with different shape signatures. Master Thesis, Gippsland School of Computing and Information Technology, Monash University Clayton Campus, Melbourne, Australia.

Zhang, Y. and D. Xiao, 2014. An image encryption scheme based on rotation matrix bit-level permutation and block diffusion. Commun. Nonlinear Sci. Numer. Simul., 19: 74-82.
Direct Link  |  

Zhen, P., G. Zhao, L. Min and X. Jin, 2016. Chaos-based image encryption scheme combining DNA coding and entropy. Multimedia Tools Appl., 75: 6303-6319.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved