Journal on Communications ›› 2018, Vol. 39 ›› Issue (5): 1-10.doi: 10.11959/j.issn.1000-436x.2018072
• Papers • Next Articles
Bin XIAO1(),Wenming SHI1,Weisheng LI1,Jianfeng MA2
Revised:
2018-01-03
Online:
2018-05-01
Published:
2018-06-01
Supported by:
CLC Number:
Bin XIAO,Wenming SHI,Weisheng LI,Jianfeng MA. Image encryption method based on multiple-order fractional discrete Tchebichef transform and generating sequence[J]. Journal on Communications, 2018, 39(5): 1-10.
[1] | 文昌辞, 王沁, 黄付敏 ,等. 基于仿射和复合混沌的图像自适应加密算法[J]. 通信学报, 2012,33(11): 119-127. |
WEN C C , WANG Q , HUANG F M ,et al. Image adaptive encryption algorithm based on affine and compound Chaos[J]. Journal on Communications, 2012,33(11): 119-127. | |
[2] | 邓晓衡, 廖春龙, 朱从旭 ,等. 像素位置与比特双重置乱的图像混沌加密算法[J]. 通信学报, 2014,35(3): 216-223. |
DENG X H , LIAO C L , ZHU C X ,et al. Image Chaos encryption algorithm with double displacement of pixel positions and bits[J]. Journal on Communications, 2014,35(3): 216-223. | |
[3] | CATTERMOLE K W . The Fourier transform and its applications[J]. Electronics & Power, 2009,11(10):357. |
[4] | ANTONINI M , BARLAUD M , MATHIEU P ,et al. Image coding using wavelet transform[J]. IEEE Transactions on Image Processing A Publication of the IEEE Signal Processing Society, 1992,1(2): 205-20. |
[5] | AHMED N , NATARAJAN T , RAO K R . Discrete cosine transform[J]. IEEE Transactions on Computers, 2006,C-23(1): 90-93. |
[6] | KOMNINOS N , MANTAS G . PEA:polymorphic encryption algorithm based on quantum computation[J]. International Journal of Systems Control & Communications, 2011,3(3): 1-18. |
[7] | AKHSHANI A , AKHAVAN A , LIM S C ,et al. An image encryption scheme based on quantum logistic map[J]. Communications in Nonlinear Science & Numerical Simulation, 2012,17(12): 4653-4661. |
[8] | EL-LATIF A A A , LI L , WANG N ,et al. A new approach to chaotic image encryption based on quantum chaotic system,exploiting color spaces[J]. Signal Processing, 2013,93(11): 2986-3000. |
[9] | YANG Y G , XIA J , JIA X ,et al. Novel image encryption/decryption based on quantum Fourier transform and double phase encoding[J]. Quantum Information Processing, 2013,12(11): 3477-3493. |
[10] | CANDAN C , KUTAY M A , OZAKTAS H M . The discrete fractional Fourier transform[C]// IEEE International Conference on Acoustics,Speech,and Signal Processing. 1999: 1713-1716. |
[11] | CARIOLARO G , ERSEGHE T , KRANIAUSKAS P . The fractional discrete cosine transform[J]. IEEE Transactions on Signal Processing, 2002,50(4): 902-911. |
[12] | LIU X , HAN G , WU J ,et al. Fractional Krawtchouk transform with an application to image watermarking[J]. IEEE Transactions on Signal Processing, 2017,PP(99): 1-1. |
[13] | 陶然, 邓兵, 王越 . 分数阶 FOURIER 变换在信号处理领域的研究进展[J]. 中国科学 信息科学:中国科学, 2006,36(2): 113-136. |
TAO R , DENG B , WANG Y . Research progress in fractional Fourier transform in signal processing[J]. Science China Information Science:Science China, 2006,36(2): 113-136. | |
[14] | KANG X , TAO R , ZHANG F . Multiple-parameter discrete fractional transform and its applications[J]. IEEE Transactions on Signal Processing, 2016,64(13): 3402-3417. |
[15] | LIMA J B , NOVAES L F G . Image encryption based on the fractional Fourier transform over finite fields[J]. Signal Processing, 2014,94(1): 521-530. |
[16] | SUI L . Asymmetric double-image encryption method by using iterative phase retrieval algorithm in fractional Fourier transform domain[J]. Optical Engineering, 2014,53(2):026108. |
[17] | ZHOU N , LIU X , ZHANG Y ,et al. Image encryption scheme based on fractional Mellin transform and phase retrieval technique in fractional Fourier domain[J]. Optics & Laser Technology, 2013,47(4): 341-346. |
[18] | TAO R , XIN Y , WANG Y . Double image encryption based on random phase encoding in the fractional Fourier domain[J]. Optics Express, 2007,15(24): 16067-16079. |
[19] | REFREGIER P , JAVIDI B . Optical image encryption based on input plane encoding and Fourier plane random encoding[J]. Optics Letters, 1995,20(7):767. |
[20] | UNNIKRISHNAN G , JOSEPH J , SINGH K . Optical encryption by double-random phase encoding in the fractional Fourier domain[J]. Optics Letters, 2000,25(12):887. |
[21] | JOSHI M , SHAKHER C , SINGH K . Fractional Fourier plane image encryption technique using radial hilbert,and jigsaw transform[J]. Optics & Lasers in Engineering, 2010,48(7-8): 754-759. |
[22] | LANG J , TAO R , WANG Y . Image encryption based on the multiple-parameter discrete fractional Fourier transform and chaos function[J]. Optics Communications, 2010,283(10): 2092-2096. |
[23] | WU J , GUO F , ZENG P ,et al. Image encryption based on a reality-preserving fractional discrete cosine transform and a Chaos-based generating sequence[J]. Journal of Modern Optics, 2013,60(20): 1760-1771. |
[24] | WU J H , ZHANG L , ZHOU N R ,et al. Image encryption based on the multiple-order discrete fractional cosine transform[J]. Optics Communications, 2010,283(9): 1720-1725. |
[25] | XIAO B , MA J F , CUI J T . Radial Tchebichef moment invariants for image recognition[J]. Journal of Visual Communication & Image Representation, 2012,23(2): 381-386. |
[26] | DAI X B , SHU H Z , LUO L M ,et al. Reconstruction of tomographicimages from limited range projections using discrete Radon transform and Tchebichef moments[J]. Pattern Recognition, 2010,43(3): 1152-1164. |
[27] | MUKUNDAN R , ONG S H , LEE P A . Image analysis by Tchebichef moments[J]. IEEE Transactions on Image Processing a Publication of the IEEE Signal Processing Society, 2001,10(9): 1357-64. |
[28] | DENG C , GAO X , LI X ,et al. A local Tchebichef moments-based robust image watermarking[J]. Signal Processing, 2009,89(8): 1531-1539. |
[29] | YAP P T , RAVEENDRAN P . Image focus measure based on Chebyshev moments[J]. IEEE Proceedings-Vision,Image and Signal Processing, 2004,151(2): 128-136. |
[30] | ZHANG L , QIAN G , XIAO W ,et al. Geometric invariant blind image watermarking by invariant Tchebichef moments[J]. Optics Express, 2007,15(5):2251. |
[31] | XIAO B , LU G , ZHANG Y ,et al. Lossless image compression based on integer discrete Tchebichef transform[J]. Neurocomputing, 2016,214(C): 587-593. |
[1] | Hua REN, Shaozhang NIU, Ruyong REN, Zhen YUE. Research on meaningful image encryption algorithm based on 2-dimensional compressive sensing [J]. Journal on Communications, 2022, 43(5): 45-57. |
[2] | Xiaoyuan YANG, Xinliang BI, Jia LIU, Siyuan HUANG. High-capacity image steganography algorithm combining image encryption and deep learning [J]. Journal on Communications, 2021, 42(9): 96-105. |
[3] | Jiu-fen LIU,Tao HAN,Yu-guo TIAN,Wen-bin LIU. Reversible data hiding in encrypted images using recompression [J]. Journal on Communications, 2015, 36(9): 13-25. |
[4] | . Image encryption algorithms based on chaos through dual scrambling of pixel position and bit [J]. Journal on Communications, 2014, 35(3): 25-222. |
[5] | Xiao-heng DENG,Chun-long LIAO,Cong-xu ZHU,Zhi-gang CHEN. Image encryption algorithms based on chaos through dual scrambling of pixel position and bit [J]. Journal on Communications, 2014, 35(3): 216-223. |
[6] | Yong ZHU,Jia-nan WANG,Qun DING. New kind of CD-DCSK chaos shift keying secure communication system [J]. Journal on Communications, 2012, 33(5): 169-176. |
[7] | Chang-ci WEN,Qin WANG,Fu-min HUANG,Zhi-shu YUAN,Chun-sheng TAO. Self-adaptive encryption algorithm for image based on affine and composed chaos [J]. Journal on Communications, 2012, 33(11): 119-127. |
[8] | Qiu-hua LIN,Jie DANG,Fu-liang YIN. Correlation calculation decrypting for BSS-based image cryptosystem [J]. Journal on Communications, 2008, 29(1): 109-114. |
[9] | Pei-rong WANG,Zhe XU,Chong FU,Wei-yong ZHU,Xing-wei WANG. Composed Chaos-based image encryption algorithm [J]. Journal on Communications, 2006, 27(11A): 285-289. |
[10] | Jian-sheng GUO,Chen-hui JIN. An attack with known image to an image cryptosystem based on general cat map [J]. Journal on Communications, 2005, 26(2): 131-135. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|