A novel image encryption framework based on markov map and singular value decomposition
Citations
117 citations
52 citations
Cites methods from "A novel image encryption framework ..."
...In [30], the SVD is exploited to produce an orthogonal key matrix which is used to encrypt images....
[...]
12 citations
Cites methods from "A novel image encryption framework ..."
...Scrambling is done by various methods based on toral automorphism ([3]), two or high-dimentional chaotic system with fixed control parameters [4] etc....
[...]
..., and the diffusion is done through the diffusion cipher like chaos based methods ([2-5]), DNA based methods ([6]), and other assorted methods [7, ....
[...]
...[3] Considered items Bhantnagar et al....
[...]
...3 Resistance to differential attack To test the influence of a one-pixel change in cipher image, two common measures [1-5] are used, i....
[...]
9 citations
Cites background from "A novel image encryption framework ..."
...Although lot of research has been done in field of chaotic theory [6, 7] but still there is need for more robustness and perceptual security to make encryption schemes more efficient and secured....
[...]
...Experimental results of the proposed algorithm indicates significant reduction of the correlation coefficient among adjacent pixels and significantly low PSNR values[6] makes it difficult to retrieve the original image from its encrypted one without the knowledge of correct decryption key....
[...]
8 citations
Cites background from "A novel image encryption framework ..."
...In [7], the authors have proposed an encryption framework based on singular value decomposition (SVD)....
[...]
References
485 citations
262 citations
256 citations
230 citations
"A novel image encryption framework ..." refers background or methods in this paper
...A one dimensional map M : U → U, U ⊂ R, U usually taken to be [0, 1 ] or [-1,1] is defined by the difference relation...
[...]
...In second phase, the scrambled image is then passed through some cryptographic algorithm like SCAN based methods [ 1 , 2], chaos based methods [3‐8], tree structure based methods [9, 10] and other miscellaneous methods [11, 12]....
[...]
184 citations