• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4597348)   Today's Articles (5514)   Subscriber (49346)
For: Chen T, Li K. Multi-image encryption by circular random grids. Inf Sci (N Y) 2012;189:255-65. [DOI: 10.1016/j.ins.2011.11.026] [Citation(s) in RCA: 48] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
Number Cited by Other Article(s)
1
A novel image protection cryptosystem with only permutation stage: multi-shuffling process. Soft comput 2023. [DOI: 10.1007/s00500-023-07970-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/14/2023]
2
Wang P, Wang Y, Xiang J, Xiao X. Fast Image Encryption Algorithm for Logistics-Sine-Cosine Mapping. SENSORS (BASEL, SWITZERLAND) 2022;22:9929. [PMID: 36560300 PMCID: PMC9783283 DOI: 10.3390/s22249929] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/27/2022] [Revised: 12/10/2022] [Accepted: 12/12/2022] [Indexed: 06/17/2023]
3
Wang K, Wu X, Gao T. Double color images compression–encryption via compressive sensing. Neural Comput Appl 2021. [DOI: 10.1007/s00521-021-05921-y] [Citation(s) in RCA: 7] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
4
Multiple images encryption based on 3D scrambling and hyper-chaotic system. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.10.031] [Citation(s) in RCA: 30] [Impact Index Per Article: 10.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
5
Yang YG, Zhang YC, Chen XB, Zhou YH, Shi WM. Eliminating the texture features in visually meaningful cipher images. Inf Sci (N Y) 2018. [DOI: 10.1016/j.ins.2017.11.009] [Citation(s) in RCA: 21] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
6
A New Image Encryption Scheme Based on Dynamic S-Boxes and Chaotic Maps. ACTA ACUST UNITED AC 2016. [DOI: 10.1007/s13319-016-0084-9] [Citation(s) in RCA: 38] [Impact Index Per Article: 4.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/22/2022]
7
Bao L, Zhou Y. Image encryption: Generating visually meaningful encrypted images. Inf Sci (N Y) 2015. [DOI: 10.1016/j.ins.2015.06.049] [Citation(s) in RCA: 126] [Impact Index Per Article: 14.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
8
Improved Secret Image Sharing Scheme in Embedding Capacity without Underflow and Overflow. ScientificWorldJournal 2015;2015:861546. [PMID: 26351657 PMCID: PMC4553325 DOI: 10.1155/2015/861546] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/23/2015] [Revised: 07/07/2015] [Accepted: 07/09/2015] [Indexed: 11/18/2022]  Open
9
Lin KS, Lin CH, Chen TH. Distortionless visual multi-secret sharing based on random grid. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.07.016] [Citation(s) in RCA: 21] [Impact Index Per Article: 2.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
10
Zhang Y, Xiao D, Wen W, Wong KW. On the security of symmetric ciphers based on DNA coding. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.08.005] [Citation(s) in RCA: 50] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
11
Yang YG, Jia X, Sun SJ, Pan QX. Quantum cryptographic algorithm for color images using quantum Fourier transform and double random-phase encoding. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.02.124] [Citation(s) in RCA: 65] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
12
Yang CN, Wu CC, Wang DS. A discussion on the relationship between probabilistic visual cryptography and random grid. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.03.033] [Citation(s) in RCA: 65] [Impact Index Per Article: 6.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
13
New extended visual cryptography schemes with clearer shadow images. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.02.099] [Citation(s) in RCA: 32] [Impact Index Per Article: 3.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
14
Image cryptographic algorithm based on the Haar wavelet transform. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.02.004] [Citation(s) in RCA: 67] [Impact Index Per Article: 6.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
15
Hou YC, Quan ZY, Tsai CF, Tseng AY. Block-based progressive visual secret sharing. Inf Sci (N Y) 2013. [DOI: 10.1016/j.ins.2013.01.006] [Citation(s) in RCA: 49] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA