EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"Image Encryption"
Narrow search

Narrow search

Year of publication
Subject
All
Image Encryption 4 Chaos 2 Chaotic map 2 Image encryption 2 Basic Matrix 1 Chaotic System 1 Chaotic encryption 1 Chaotic maps 1 Cloud Computing 1 Cloud computing 1 Cloud storage 1 Cryptanalysis 1 DNA encoding 1 Data security 1 Datensicherheit 1 E-commerce 1 Electronic Commerce 1 Exclusive 1 Histogram Shifting 1 Homomorphic Property 1 Image Decryption 1 Information Sharing 1 Integer wavelet transform 1 Lossless Recovery 1 Online retailing 1 Online-Handel 1 Performance Metrics 1 Permutation 1 Pixel Expansion 1 Privacy Protection 1 Random Search 1 Reversible Data Hiding 1 Secure Communication 1 Security 1 Substitution 1 Substitution-Box 1 Visual Cryptography 1 Visual Secret Sharing 1 image encryption 1 permutation 1
more ... less ...
Online availability
All
Undetermined 7
Type of publication
All
Article 7
Type of publication (narrower categories)
All
Article in journal 2 Aufsatz in Zeitschrift 2
Language
All
English 6 Undetermined 1
Author
All
Abu-Amara, Fadi 1 Ahmad, Jawad 1 Ahmad, Musheer 1 Ahmad, Zishan 1 Chen, Kai 1 Geetha, S 1 Infanteena, A Magnus 1 Lian, Shiguo 1 Liu, Xin 1 Pounambal, M. 1 Punithavathi, P 1 Sang, Jianzhi 1 Sindhu, S Siva Sivatha 1 Subashanthini, S. 1 Sun, Jinsheng 1 Wang, Shen 1 Wang, Zhiquan 1 Xu, Dawen 1 Zhang, Weizhe 1
more ... less ...
Published in...
All
International Journal of Digital Crime and Forensics (IJDCF) 2 Information systems and e-business management : ISeB 1 International Journal of Information Security and Privacy (IJISP) 1 International Journal of Rough Sets and Data Analysis (IJRSDA) 1 Journal of information & knowledge management : JIKM 1 Physica A: Statistical Mechanics and its Applications 1
Source
All
Other ZBW resources 4 ECONIS (ZBW) 2 RePEc 1
Showing 1 - 7 of 7
Cover Image
A proposal of a new chaotic map for application in the image encryption domain
Abu-Amara, Fadi; Ahmad, Jawad - In: Journal of information & knowledge management : JIKM 22 (2023) 2, pp. 1-25
Persistent link: https://www.econbiz.de/10014388474
Saved in:
Cover Image
Three stage hybrid encryption of cloud data with penta-layer security for online business users
Subashanthini, S.; Pounambal, M. - In: Information systems and e-business management : ISeB 18 (2020) 3, pp. 379-404
Persistent link: https://www.econbiz.de/10012416434
Saved in:
Cover Image
An Efficient Reversible Data Hiding Scheme for Encrypted Images
Chen, Kai; Xu, Dawen - In: International Journal of Digital Crime and Forensics (IJDCF) 10 (2018) 2, pp. 1-22
Reversible data hiding in the encrypted domain is an emerging technology, as it can preserve the confidentiality. In this article, an efficient method of reversible data hiding in encrypted images is proposed. The cover image is first partitioned into non-overlapping blocks. A specific modulo...
Persistent link: https://www.econbiz.de/10012043964
Saved in:
Cover Image
A Literature Review on Image Encryption Techniques
Geetha, S; Punithavathi, P; Infanteena, A Magnus; … - In: International Journal of Information Security and … 12 (2018) 3, pp. 42-83
article reviews and summarizes various image encryption techniques so as to promote development of advanced image encryption …
Persistent link: https://www.econbiz.de/10012045719
Saved in:
Cover Image
Random Search Based Efficient Chaotic Substitution Box Design for Image Encryption
Ahmad, Musheer; Ahmad, Zishan - In: International Journal of Rough Sets and Data Analysis … 5 (2018) 2, pp. 131-147
Cryptographic Substitution-boxes are source of nonlinearity in modern block encryption systems. The robustness and confusion imparted through these systems heavily rely on the strength of their S-boxes. This brings new challenges to design cryptographically potent S-boxes to develop strong...
Persistent link: https://www.econbiz.de/10012047411
Saved in:
Cover Image
A Novel Pixel Merging-Based Lossless Recovery Algorithm for Basic Matrix VSS
Zhang, Weizhe; Liu, Xin; Wang, Shen; Sang, Jianzhi - In: International Journal of Digital Crime and Forensics (IJDCF) 9 (2017) 3, pp. 1-10
Lossless recovery in visual secret share (VSS) is very meaningful. In this paper, a novel lossless recovery algorithm for the basic matrix VSS is proposed. The secret image is reconstructed losslessly by using simple exclusive XOR operation and merging pixel. The algorithm not only can apply to...
Persistent link: https://www.econbiz.de/10012043944
Saved in:
Cover Image
Security analysis of a chaos-based image encryption algorithm
Lian, Shiguo; Sun, Jinsheng; Wang, Zhiquan - In: Physica A: Statistical Mechanics and its Applications 351 (2005) 2, pp. 645-661
The security of Fridrich's algorithm against brute-force attack, statistical attack, known-plaintext attack and select-plaintext attack is analyzed by investigating the properties of the involved chaotic maps and diffusion functions. Based on the given analyses, some means are proposed to...
Persistent link: https://www.econbiz.de/10010589989
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...