J Shanghai Jiaotong Univ Sci ›› 2021, Vol. 26 ›› Issue (4): 488-493.doi: 10.1007/s12204-021-2318-0
• Computer & Communication Engineering • Previous Articles Next Articles
THAMANAM Srinivasa Rao *, NAGARAJA Potti, NAIK B Balaji, MANJUNATHACHARI K
Online:
2021-08-28
Published:
2021-06-06
Contact:
THAMANAM Srinivasa Rao
E-mail:sthamana@gitam.edu
CLC Number:
THAMANAM Srinivasa Rao , NAGARAJA Potti, NAIK B Balaji, MANJUNATHACHARI K. A Novel Image Encryption Technique Based on Inter Block Difference[J]. J Shanghai Jiaotong Univ Sci, 2021, 26(4): 488-493.
[1] | EL ABBADI N K, MOHAMAD A, ABDULHAMEED M. Image encryption based on singular value decomposition [J]. Journal of Computer Science,2014, 10(7): 1222-1230. |
[2] | NASKAR P K, CHAUDHURI A, CHAUDHURI A. A secure symmetric image encryption based on linear geometry [C]//2014 Applications and Innovations in Mobile Computing. Kolkata, India: IEEE, 2014: 67-74. |
[3] | YE R S, ZENG S J, LUN P Q, et al. An image encryption scheme based on bit circular shift and bidirectional diffusion [J]. International Journal of Information Technology and Computer Science, 2014, 6(1):82-92. |
[4] | KR NASKAR P, CHAUDHURI A. A secure symmetric image encryption based on bit-wise operation [J].International Journal of Image, Graphics and Signal Processing, 2014, 6(2): 30-38. |
[5] | CHEN J X, ZHU Z L, LIU Z J, et al. A novel doubleimage encryption scheme based on cross-image pixel scrambling in gyrator domains [J]. Optics Express,2014, 22(6): 7349-7361. |
[6] | ALGHAMDI A S, ULLAH H. A secure Iris image encryption technique using bio-chaotic algorithm [J]. International Journal of Computer and Network Security,2010, 2(4): 78-84. |
[7] | ALGHAMDI A S, ULLAH H, MAHMUD M, et al. Bio-chaotic stream cipher-based Iris image encryption [C]//2009 International Conference on Computational Science and Engineering. Vancouver, BC, Canada:IEEE, 2009: 739-744. |
[8] | SUN Y Y, CHEN L N, XU R D, et al. An image encryption algorithm utilizing Julia sets and Hilbert curves[J]. PLoS One, 2014, 9(1): e84655. |
[9] | ARUL MURUGAN C, KARTHIGAIKUMAR P. Survey on image encryption schemes, bio cryptography and efficient encryption algorithms[J]. Mobile Networks and Applications, 2018.https://doi.org/10.1007/s11036-018-1058-3 (published online). |
[10] | DAWAHDEH Z E, YAAKOB S N, RAZIF BIN OTHMAN R. A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher [J].Journal of King Saud University-Computer and Information Sciences, 2018, 30(3): 349-355. |
[11] | YASSER I, KHALIFA F, MOHAMED M A, et al. A new image encryption scheme based on hybrid chaotic maps [J]. Complexity, 2020, 2020: 1-23. |
[12] | ES-SABRY M, EL AKKAD N, MERRAS M, et al. A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators[J]. Soft Computing, 2020, 24(5): 3829-3848. |
[1] | SU Mang (苏铓), WANG Liangchen (汪良辰), FU Anmin (付安民), YU Yan (俞研). Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud [J]. Journal of Shanghai Jiao Tong University (Science), 2018, 23(5): 666-670. |
[2] | Xiuwei FU, Xingquan GAO, Li FU. Simulation Experiment Platform for Digital Logic Based on Secure Encryption Algorithm [J]. Research and Exploration in Laboratory, 2017, 36(5): 106-109. |
[3] |
CHEN Ning,HE Xiaobin,GUI Weihua,YANG Chunhua.
Research on Image Encryption System Based on Chaotic Discrete Sequence [J]. Journal of Shanghai Jiaotong University, 2017, 51(10): 1273-1280. |
[4] | GUO Jie*(郭捷), XU Jia-yun (徐家运), BAO Jia-li (鲍佳立). Region of Interest Based Selective Encryption Scheme for Privacy Protection in H.264 Video [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 385-391. |
[5] | WANG Liang-liang1* (王亮亮), CHEN Ke-fei2 (陈克非),MAO Xian-ping1 (毛贤平), WANG Yong-tao3 (王永涛). Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 398-405. |
[6] | LONG Yu1* (龙宇), CHEN Ke-fei2 (陈克非), MAO Xian-ping1 (毛贤平). New Constructions of Dynamic Threshold Cryptosystem [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 431-435. |
[7] | WANG Chih-hung* (王智弘), TU Tai-yuan (涂泰源). Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 440-442. |
[8] | JENG Fuh-gwoa (郑富国), LIN Kai-siangb (林恺翔), LIN Chih-hungc (林志鸿), CHEN Tzung-herb*(陈宗和). Visual Multi-Secret Sharing with Friendliness [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 455-465. |
[9] | SUN Jin1,2,HU Yupu2. Fully Secure Anonymous Identity-Based Broadcast Encryption Scheme [J]. Journal of Shanghai Jiaotong University, 2013, 47(07): 1103-1108. |
[10] | QI Cheng-Jie, DONG Xiao-Lei. An Efficient and Secure Spatial Encryption Scheme [J]. Journal of Shanghai Jiaotong University, 2012, 46(09): 1361-1365. |
[11] | WANG Jing-Jing, CHEN Ke-Fei. Improvement of Discrete Fourier Transform Attack [J]. Journal of Shanghai Jiaotong University, 2012, 46(02): 285-288. |
[12] | SUN Jin (孙 瑾), HU Yu-pu (胡予濮), ZHANG Le-you (张乐友). Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(6): 672-676. |
[13] | JIN Quan-a, GU Da-Wu-a, ZHAO Jian-Jie-b. Design and Optimized Implementation of Rainbow Table with GPU [J]. Journal of Shanghai Jiaotong University, 2011, 45(07): 1006-1011. |
[14] |
ZHANG Lei,CAO Zhenfu . An AttributeBased Encryption Scheme Suitable for Distributed Network [J]. Journal of Shanghai Jiaotong University, 2010, 44(11): 1507-1512. |
[15] | MA Rong,CAO Zhenfu. An Efficient and Full Secure IdentityBased Encryption Scheme [J]. Journal of Shanghai Jiaotong University, 2010, 44(03): 389-0392. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 93
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 311
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||