• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4597081)   Today's Articles (5282)   Subscriber (49345)
For: Tedmori S, Al-najdawi N. Image cryptographic algorithm based on the Haar wavelet transform. Inf Sci (N Y) 2014;269:21-34. [DOI: 10.1016/j.ins.2014.02.004] [Citation(s) in RCA: 67] [Impact Index Per Article: 6.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
Number Cited by Other Article(s)
1
Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2023. [DOI: 10.1016/j.jisa.2022.103391] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/15/2022]
2
Talhaoui MZ, Wang X. A new fractional one dimensional chaotic map and its application in high-speed image encryption. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.10.048] [Citation(s) in RCA: 22] [Impact Index Per Article: 7.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
3
Bhardwaj J, Nayak A. Haar wavelet transform-based optimal Bayesian method for medical image fusion. Med Biol Eng Comput 2020;58:2397-2411. [PMID: 32734326 DOI: 10.1007/s11517-020-02209-6] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/19/2019] [Accepted: 06/07/2020] [Indexed: 11/30/2022]
4
Kumar S, Kumar M, Budhiraja R, Das M, Singh S. A cryptographic model for better information security. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2018. [DOI: 10.1016/j.jisa.2018.10.011] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
5
Kumar GD, Teja DP, Reddy SS, Sasikaladevi N. An Efficient Watermarking Technique for Biometric Images. ACTA ACUST UNITED AC 2017. [DOI: 10.1016/j.procs.2017.09.101] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
6
Vengadapurvaja A, Nisha G, Aarthy R, Sasikaladevi N. An Efficient Homomorphic Medical Image Encryption Algorithm For Cloud Storage Security. ACTA ACUST UNITED AC 2017. [DOI: 10.1016/j.procs.2017.09.150] [Citation(s) in RCA: 38] [Impact Index Per Article: 5.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
7
A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. Inf Sci (N Y) 2016. [DOI: 10.1016/j.ins.2016.02.041] [Citation(s) in RCA: 152] [Impact Index Per Article: 19.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
8
Hua Z, Zhou Y. Image encryption using 2D Logistic-adjusted-Sine map. Inf Sci (N Y) 2016. [DOI: 10.1016/j.ins.2016.01.017] [Citation(s) in RCA: 444] [Impact Index Per Article: 55.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/28/2022]
9
Account classification in online social networks with LBCA and wavelets. Inf Sci (N Y) 2016. [DOI: 10.1016/j.ins.2015.10.039] [Citation(s) in RCA: 26] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
10
Bao L, Zhou Y. Image encryption: Generating visually meaningful encrypted images. Inf Sci (N Y) 2015. [DOI: 10.1016/j.ins.2015.06.049] [Citation(s) in RCA: 126] [Impact Index Per Article: 14.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
11
Belazi A, Abd El-Latif AA, Rhouma R, Belghith S. Selective image encryption scheme based on DWT, AES S-box and chaotic permutation. 2015 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC) 2015. [DOI: 10.1109/iwcmc.2015.7289152] [Citation(s) in RCA: 10] [Impact Index Per Article: 1.1] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/02/2023]
12
An image watermarking scheme in wavelet domain with optimized compensation of singular value decomposition via artificial bee colony. Inf Sci (N Y) 2015. [DOI: 10.1016/j.ins.2014.12.042] [Citation(s) in RCA: 93] [Impact Index Per Article: 10.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
13
2D Sine Logistic modulation map for image encryption. Inf Sci (N Y) 2015. [DOI: 10.1016/j.ins.2014.11.018] [Citation(s) in RCA: 471] [Impact Index Per Article: 52.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
14
Transcale control for a class of discrete stochastic systems based on wavelet packet decomposition. Inf Sci (N Y) 2015. [DOI: 10.1016/j.ins.2014.10.039] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
15
Cao Y, Zhang SJ, Zha ZJ, Zhang J, Chen CW. A novel segmentation based video-denoising method with noise level estimation. Inf Sci (N Y) 2014. [DOI: 10.1016/j.ins.2014.05.031] [Citation(s) in RCA: 8] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA