Author:
Khashan Osama A.,Zin Abdullah M.,Sundararajan Elankovan A.
Publisher
Zhejiang University Press
Reference34 articles.
1. Amigó, J.M., Kocarev, L., Szczepanski, J., 2007. Theory and practice of chaotic cryptography. Phys. Lett. A, 366(3): 211–216. [doi:10.1016/j.physleta.2007.02.021]
2. Bhatnagar, G., Wu, Q.M., 2012. Selective image encryption based on pixels of interest and singular value decomposition. Dig. Signal Process., 22:648–663. [doi:10.1016/j.dsp.2012.02.005]
3. Chen, T.S., Chang, C.C., Hwang, M.S., 1998. A virtual image cryptosystem based upon vector quantization. IEEE Trans. Image Process., 7(10):1485–1488. [doi:10.1109/83.718488]
4. Cheng, H., Li, X., 2000. Partial encryption of compressed images and videos. IEEE Trans. Signal Process., 48(8): 2439–2451. [doi:10.1109/78.852023]
5. Droogenbroeck, M.V., Benedett, R., 2002. Techniques for a selective encryption of uncompressed and compressed images. Proc. Advanced Concepts for Intelligent Vision Systems, p.90–97.
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献