Voir la notice de l'article provenant de la source Library of Science
@article{IJAMCS_2019_29_4_a14, author = {Tuncer, Turker and Dogan, Sengul and Tadeusiewicz, Ryszard and P{\l}awiak, Pawe{\l}}, title = {Improved reference image encryption methods based on 2\protect\textsuperscript{k} correction in the integer wavelet domain}, journal = {International Journal of Applied Mathematics and Computer Science}, pages = {817--829}, publisher = {mathdoc}, volume = {29}, number = {4}, year = {2019}, language = {en}, url = {http://geodesic.mathdoc.fr/item/IJAMCS_2019_29_4_a14/} }
TY - JOUR AU - Tuncer, Turker AU - Dogan, Sengul AU - Tadeusiewicz, Ryszard AU - Pławiak, Paweł TI - Improved reference image encryption methods based on 2k correction in the integer wavelet domain JO - International Journal of Applied Mathematics and Computer Science PY - 2019 SP - 817 EP - 829 VL - 29 IS - 4 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/IJAMCS_2019_29_4_a14/ LA - en ID - IJAMCS_2019_29_4_a14 ER -
%0 Journal Article %A Tuncer, Turker %A Dogan, Sengul %A Tadeusiewicz, Ryszard %A Pławiak, Paweł %T Improved reference image encryption methods based on 2k correction in the integer wavelet domain %J International Journal of Applied Mathematics and Computer Science %D 2019 %P 817-829 %V 29 %N 4 %I mathdoc %U http://geodesic.mathdoc.fr/item/IJAMCS_2019_29_4_a14/ %G en %F IJAMCS_2019_29_4_a14
Tuncer, Turker; Dogan, Sengul; Tadeusiewicz, Ryszard; Pławiak, Paweł. Improved reference image encryption methods based on 2k correction in the integer wavelet domain. International Journal of Applied Mathematics and Computer Science, Tome 29 (2019) no. 4, pp. 817-829. http://geodesic.mathdoc.fr/item/IJAMCS_2019_29_4_a14/
[1] Avci, E., Tuncer, T. and Avci, D. (2016). A novel reversible data hiding algorithm based on probabilistic XOR secret sharing in wavelet transform domain, Arabian Journal for Science and Engineering 41(8): 3153–3161, DOI: 10.1007/s13369-016-2124-4.
[2] Bao, L. and Zhou, Y. (2015). Image encryption: Generating visually meaningful encrypted images, Information Sciences 324: 197–207.
[3] Chai, X., Gan, Z., Chen, Y. and Zhang, Y. (2017). A visually secure image encryption scheme based on compressive sensing, Signal Processing 134: 35–51.
[4] Chang, C.-C., Lin, C.-C. and Chen, Y.-H. (2008). Reversible data-embedding scheme using differences between original and predicted pixel values, IET Information Security 2(2): 35–46.
[5] Chen, B., Coatrieux, G., Chen, G., Sun, X., Coatrieux, J.L. and Shu, H. (2014). Full 4-d quaternion discrete Fourier transform based watermarking for color images, Digital Signal Processing 28: 106–119.
[6] Chen, G., Mao, Y. and Chui, C.K. (2004). A symmetric image encryption scheme based on 3d chaotic cat maps, Chaos, Solitons Fractals 21(3): 749–761.
[7] Dhall, S., Pal, S. K. and Sharma, K. (2018). Cryptanalysis of image encryption scheme based on a new 1d chaotic system, Signal Processing 146: 22–32.
[8] Faragallah, O.S. (2013). Efficient video watermarking based on singular value decomposition in the discrete wavelet transform domain, International Journal of Electronics and Communications 67(3): 189–196.
[9] Ghebleh, M., Kanso, A. and Noura, H. (2014). An image encryption scheme based on irregularly decimated chaotic maps, Signal Processing: Image Communication 29(5): 618–627.
[10] Kanso, A. and Ghebleh, M. (2017). An algorithm for encryption of secret images into meaningful images, Optics and Lasers in Engineering 90: 196–208.
[11] Lee, S.-H. (2014). DWT based coding DNA watermarking for DNA copyright protection, Information Sciences 273: 263–286.
[12] Liu, F. and Wu, C. (2011). Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners, IET Information Security 5(2): 121–128.
[13] Peng, F., Li, X. and Yang, B. (2012). Adaptive reversible data hiding scheme based on integer transform, Signal Processing 92(1): 54 – 62.
[14] Prasanth Vaidya, S. and Chandra Mouli, P.V.S.S.R. (2017). A robust semi-blind watermarking for color images based on multiple decompositions, Multimedia Tools and Applications 76(24): 25623–25656, DOI: 10.1007/s11042-017-4355-0.
[15] Prasanth Vaidya, S. and Chandra Mouli, P.V.S.S.R. (2018). Adaptive, robust and blind digital watermarking using Bhattacharyya distance and bit manipulation, Multimedia Tools and Applications 77(5): 5609–5635, DOI: 10.1007/s11042-017-4476-5.
[16] Sun, S. (2016). A novel edge based image steganography with 2k correction and Huffman encoding, Information Processing Letters 116(2): 93–99.
[17] Tanchenko, A. (2014). Visual-PSNR measure of image quality, Journal of Visual Communication and Image Representation 25(5): 874–878.
[18] Tuncer, T. and Avci, E. (2016). A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images, Displays 41: 1–8.
[19] Yang, Y.-G., Zhang, Y.-C., Chen, X.-B., Zhou, Y.-H. and Shi, W.-M. (2018). Eliminating the texture features in visually meaningful cipher images, Information Sciences 429: 102–119.