Public Key Encryption of Images and Videos in Real Time Using Chebyshev Maps
Citations
35 citations
Cites background from "Public Key Encryption of Images and..."
...Ganesan et al (Ganesan et al., 2008) described a public key encryption (PKVE) of videos based on chaotic maps....
[...]
...The PKVE is secure against known/chosen-plaintext attacks, and has high key sensitivity....
[...]
...In PKVE, if the number of frames is too large, they first use phase scrambling (see Fig.9) (Nishchal et al., 2003) to scramble the video data, and then encrypt the data using chebyshev maps (Bergamo et al., 2005) (see Equation 17)....
[...]
...From Table 3, we get the following conclusions: (1) The CVES, PKVE and LCVS encrypt the video data completely without considering interest regions....
[...]
..., 2002) Y Y Y Y N M N N Y N N PKVE (Ganesan et al., 2008) Y Y Y Y N H N N Y N N LCVS (Kezia & Sudha, 2008) Y N N Y Y M N N Y N N HVOE (Tzouveli et al....
[...]
23 citations
20 citations
Cites background from "Public Key Encryption of Images and..."
...[13] to encrypt color images and videos in real time applications....
[...]
...[13] Public Key Encryption Digital Signature...
[...]
19 citations
Cites background from "Public Key Encryption of Images and..."
...Among them, some encrypt the raw data completely without considering region-of-interest, [32][33][34][35][36] and some consider the region-of-interest partially or selectively [41][42]....
[...]
...CVES[32] H No No No Yes No Yes No PKE[33] L No No No Yes No Yes No LCS [34] L No No Yes Yes No Yes No FSES[35] H No No No Yes No Yes No...
[...]
...1) The encryption algorithms, CVES, PKE, LCS and FSES, encrypt the video data completely, without considering interest regions....
[...]
...Ganesan et al [33] described a public key encryption (PKE) of images and videos based on chebyshev maps, shown as Eq....
[...]
12 citations
References
14,980 citations
"Public Key Encryption of Images and..." refers background in this paper
...Diffie and Hellman showed for the first time that secret communication was possible without any transfer of a secret key between sender and receiver [6]....
[...]
13,597 citations
"Public Key Encryption of Images and..." refers background in this paper
...to figure out the approximate value of any pixel with the knowledge of its adjacent pixels. 4.3. Mono bit test [ 9 ]...
[...]
...Image(256x256) 9654 9 ]...
[...]
803 citations
283 citations
"Public Key Encryption of Images and..." refers background or methods in this paper
...For the description of how to calculate r’ one can refer to [2]....
[...]
...We discuss the algorithm for textual data and present the cryptanalysis which can be performed on this algorithm for the recovery of encrypted data [2]....
[...]
193 citations