References
[1]. Kuo, C.J., & Chen, M.S. (1991). A New Signal
Encryption Technique And Its Attack Study. IEEE
proceedings, 149-153.
[2]. AI-Jabri, A.K., & Al-Asmari, A.K. (1996). Secure
Progressive Transmission of Compressed Images. IEEE
Transactions on Consumer Electronics, 42(3), 504 – 512.
[3]. Gluckstad, J., Mogensen, P. C., Toyoda, H., & Hara, T.
(1999). Binary phase image encryption method. IEEE
proceedings, 1314-1315.
[4]. Li, S., & Zheng, X. (2002). On the Security of an Image
Encryption Method. IEEE International Conference on
Image Processing, 2, 925-928.
[5]. Shin, C.M., Seo, D.H., Cho, K., Lee, H., & Kim, S.(2003).
Multilevel Image Encryption By Binary Phase Xor
Operations. IEEE proceedings, 426-426.
[6]. Chang, Y. C., Chang, H.T., & Kuo, C.J. (2003). Optical
Image Encryption Based on Dyadic Phase Permutation in
Fourier Domain. IEEE proceedings, 93-93.
[7]. Ziedan, I.E., Fouad, M.M., & Salem, D.H. (2003).
Application of Data Encryption Standard to Bitmap and
JPEG Images. 20th National Radio Science Conference,
C16 1- C16 8.
[8]. Zhang, B., & Kahn, M. (2004). Simulation of optical
XOR encryption using MATLAB. IEEE AFRICON, 995 – 1000.
[9]. Huang, C.K., Hsu, Y.H., Chen, W.Y., Changchien, S.K.,
Hung, C.M., Liu, C.H., & Tian, Y.R. (2009). Image
encryption algorithm of double scrambling based on
ASCII code of Matrix element. ICICS.
[10]. Lukac, R., & Plataniotis, K.N. (2004). A Color Image
Secret Sharing Scheme Satisfying the Perfect Reconstruction Property. IEEE 6th workshop on Multimedia
Digital Processing. 351-354.
[11]. Lukac R., & Plataniotis K.N. (2004). Colour image
secret sharing. Electronics Letters , 40(9).
[12]. Öztürk, S., & Sogukpinar, I. (2005). Analysis and
Comparison of Image Encryption Algorithms. World
Academy of Science, Engineering and Technology,3, 26-
30.
[13]. Martin, K., Lukac, R., & Plataniotis, K.N. (2005).
Efficient Encryption of Compressed Color Image, IEEE
ISIE, 1245-1250.
[14]. El- Khamy, S.E., Lotfy, M., & Ali, A.H. (2005). A new
fuzzy pn codes based color image encryption technique.
IEEE proceedings.
[15]. Said, A. (2005). Measuring The Strength of Partial
Encryption Schemes. IEEE proceedings.
[16]. Gopinathan, U., Monaghan, D.S., Naughton, T.J.,
Sheridan, J.T., & Javidi, B. (2005). Strengths & weaknesses
of optical encryption Algorithms. IEEE proceedings, 951-
952.
[17]. Amador, J.J., & Green R.W. (2005). Symmetric-key
block cipher for image and text cr yptography.
International Journal of Imaging systems and
Technology, 15(3), 178-188.
[18]. Sudharsanan, S. (2005). Shared Key Encryption of
JPEG Color Images. IEEE Transactions on Consumer
Electronics, 51(4), 1204 -1211.
[19]. Alvarez, G., Hernandez, A., Hernandez, L., Mari'n,
A., & Rodriguez, G. (2005). A New Graphic Cryptosystem
Based On One-Dimensional Memory Cellular Automata.
IEEE proceedings.
[20]. Chen, R.J., Lu, W.K., & Lai, J.L. (2005). Image
Encr yption Using Progressive Cellular Automata
Substitution and SCAN. IEEE proceedings. 1690-1693.
[21]. Grangetto, M., Magli, E., & Olmo, G. (2006).
Multimedia Selective Encr yption by Means of
Randomised Arithmetic Coding. IEEE Transactions On
Multimedia, 8(5), 905-917.
[22]. Ravishankar, K.C., & Venkateshmurthy, M.G. (2006).
Region Based Selective Image Encr yption. IEEE Proceedings, 1-6.
[23]. Huang, Q., & Liu, J. (2006). Secure Image Encryption
Technique Based on Multiple Fresnel Diffraction
Transforms. ICWMMN Proceedings.
[24]. Chen, C.S., & Chen R.J. (2006). Image Encryption
and Decryption Using Scan Methodology. Seventh
International Conference on Parallel and Distributed
Computing, Applications and Technologies, 61-66.
[25]. Chen, R.J., Chen Y.H., Chen C.S., & Lai, J.L. (2006).
Image Encryption/Decryption System Using 2-D Cellular
Automata. IEEE proceedings, 2006.
[26]. Vilardy, J.M., Calderon, J.E., Torres, C.O., & Mattos,
L. (2006). Digital Images Phase Encryption using
Fractional Fourier Transform. Proceedings of the
Electronics, Robotics and Automotive Mechanics
Conference.
[27]. Wong, A., & Bishop, W. (2006). Expert Knowledge
Based Automatic Regions-of-Interest (ROI) Selection in
Scanned Documents for Digital Image Encryption.
Proceedings of the 3rd Canadian Conference on
Computer and Robot Vision.
[28]. Chen, B., & Chandran, V. (2007). Biometric Based
Cryptographic Key Generation from Faces. Digital Image
Computing Techniques and Applications. 394-401,
2007.
[29]. Kingston, A., Colosimo, S., Campisi, P., & Autrusseau,
F. (2007). Lossless Image Compression And Selective
Encryption Using A Discrete Radon Transform. ICIP, IV 465-
IV 468.
[30]. Benabdellah, M., Himmi, M. M., Zahid, N., Regragui,
F., & Bouyakhf, E.H. (2007). Encryption-Compression of
Images Based on FMT and AES Algorithm. Applied
Mathematical Sciences, Vol. 1(45), 2203 – 2219.
[31]. Jagannathan, V., Mahadevan A., Hariharan R., &
Srinivasan E. (2007). Number Theory Based Image
Compression Encryption and Application to Image
Multiplexing. IEEE - ICSCN, 59 – 64.
[32]. Sawda, R.E., & Hamam, H. (2007). RGB Colored
Image Encryption Processes Using Several Colored Keys
Images. IEEE proceedings.
[33]. Zeghid, M., Machhout, M., Khriji, L., Baganne, A., &
Tourki, R. (2007). A Modified AES Based Algorithm for
Image Encr yption. World Academy of Science,
Engineering and Technology, 27, 206-211.
[34]. Yu, F., Luo, H., Pan, J.S., & Lu, Z.M. (2008). Lossless and
Lossy Image Secret Sharing for Data Transmission. Eighth
International Conference on Intelligent Systems Design
and Applications, 209-214.
[35]. Longe, O.B., Robert, A.B.C., Chiemeke, S. C.,
Onifade, O.F.W., Okpalugo, C., & Olaseni, T. (2008).
Cascaded Encryption Scheme (CES) for Robust Content
Security Over Internet Networks. World Congress on
Engineering, 3.
[36]. Yadav, A.K., & Purwar, R.K. (2008). Complexity
Analysis of Image Encr yption Technique. IEEE
proceedings.
[37]. Zhang, Z., Liu, G., Gao, Y., Hu, X., & Wang, S. (2008).
A 3-D Encryption Technique Using Computer-Generated
Hologram. International Conference on Embedded
Software and Systems Symposia, 3-6.
[38]. Li, X., Wu, X., Qi, N., & Wang, K. (2008). A Novel
Cr yptographic Algorithm based on Iris Feature.
International Conference on Computational
Intelligence and Security, 463-466.
[39]. Wu, X., Qi, N., Wang, K., & Zhang, D. (2008). A Novel
Cryptosystem based on Iris Key Generation. Fourth
International Conference on Natural Computation, 53-
56.
[40]. El-Iskandarani, M. A., Darwish, S., & Abuguba, S.M.
(2008). A Robust and Secure Scheme for Image
Transmission Over Wireless Channels. IEEE proceedings,
51-55.
[41]. Kulkarni, N.S., Gupta, I., & Kulkarni, S.N. (2008). A
Robust Image Encryption Technique based on Random
Vector. First International Conference on Emerging
Trends in Engineering and Technology, 15-19.
[42]. Ihao, S. (2008). A secure and efficient fingerprint
images encryption scheme. IEEE proceedings.
[43]. Al-khassaweneh, M., & Aviyente, S. (2008). Image
Encryption Scheme Based on Using Least Square Approximation Techniques. IEEE proceedings, 108-111.
[44]. Rhee, K.M. (2008). Image Encryption Using Self
Regressive Function. Fourth International Conference on
Networked Computing and Advanced Information
Management, 442 – 445.
[45]. Wharton, E., Panetta, K., & Agaian, S. (2008).
Simultaneous Encryption/Compression of Images Using
Alpha Rooting. Data Compression Conference, IEEE
proceedings.
[46]. Ali, S., Gilani, N., & Bangash, M.A. (2008). Enhanced
Block Based Color Image Encryption Technique with
Confusion. IEEE proceedings, 200-206.
[47]. Liu, F., Wu, C.K., & Lin, X.J. (2008). Colour visual
cryptography schemes. IET Information Security, 2(4),
151–165.
[48]. Kumar, A., & Makur, A. (2008). Distributed Source
Coding based Encryption and Lossless Compression of
Gray Scale and Color Images. MMSP, 760-764.
[49]. Yahya, A.A., & Abdalla, A.M. (2008). A Shuffle
Image-Encryption Algorithm. IEEE proceedings.
[50]. Acharya, B., Patra, S.K., & Panda, G. (2008). Image
Encr yption by Novel Cr yptosystem Using Matrix
Transformation. First International Conference on
Emerging Trends in Engineering and Technology, 77 – 81.
[51]. Alsultanny, Y. A. (2008). Testing Image Encryption by
Output Feedback (OFB). Journal of Computer Science 4
(2).
[52]. Usama, M., & Khan, M.K. (2008). Classical and
Chaotic Encryption Techniques for the Security of Satellite
Images. IEEE proceedings.
[53]. Gong-bin, Q., Qing-feng, J., & Shui-sheng, Q.
(2009). A New Image Encryption Scheme Based on DES
Algorithm and Chua's Circuit. International Workshop on
Imaging Systems and Techniques.
[54]. Ahmed, F., Siyal, M.Y., & Abbas, V.U. (2009). A Robust
Image Encryption Scheme using State-Feedback
Control. IEEE proceedings.
[55]. Ghaffar, A., Allam, E.A., Mansour, M.E., Kumar, H.A. &
Abo-Alsoud, M.A. (2009). A Secure Face Verification
System Based on Robust Hashing and Cryptography. IEEE Approximation Techniques. IEEE proceedings, 108-111.
[56]. Zhao, H., Ran, Q., Ge, G., Ma, J., & Tan, L. (2009).
Image Encryption Based on Random Fractional Discrete
Cosine and Sine Transforms. First International Workshop
on Education Technology and Computer Science, IEEE
proceedings, 804-808.
[57]. Ihou, Y., Panetta, K., & Agaian, S. (2009). Image
Encryption Using Binary Key-images. IEEE International
Conference on Systems, Man, and Cybernetics, 4569-
4574.
[58]. Vreugdenhil, J., Iverson, K., & Katti, R.S. (2009).
Image Encyption Using Dynamic Shuffling and XORing
Processes. IEEE proceedings, 734-737.
[59]. Li, X., Ta, R., Dae, L., & Wang, V. (2009). Reality-
Preserving Image Encryption Associated with the
Generalised Hilbert Transform. IEEE International
Symposium on Industrial Electronics, 1909-1913.
[60]. Flayh, N.A., Parveen, R., & Ahson, S.I. (2009).
Wavelet Based Partial Image Encr yption. IEEE
proceedings, 32-35.
[61 ]. Fan, J., & Zhang, Y. (2009). Color image encryption
and decryption based on double random phase
encoding technique. IEEE proceedings.
[62]. Yin-fung (2009). Fourier Transform in Image
Encryption. ELEC 8501: The Fourier Transform and its
Applications.
[63]. Acharya, B., Shukla, S. K., Panigrahy, S. K., Patra, S.
K., & Panda, G. (2009). H-S-X Cryptosystem and Its
Application to Image Encr yption. International
Conference on Advances in Computing, Control, and
Telecommunication Technologies. 720-724.
[64]. Nakagata, Shohei, Kuraki, Kensuke, Anan & Taizo
(2009). Device, Method, And Program For Image
Encryption/Decryption”, IEEE proceedings.
[65]. Cheddad, A., Condell, J., Curran, K., & McKevitt, P.
(2010). A hash Based Image Encryption Algorithm. Optics
communication, 283(6), 879-893.
[66]. Liu, Z., Chen, H., Liu, T., Li, P., Dai, J., Sun, X., & Liu, S.
(2010). Double-image encryption based on the affine
transform and the gyrator transform., Journal of optics.
[67]. Sathyanarayana, S. V., Kumar, M. A., & Bhat, K.N.H.
(2011). Symmetric Key Image Encryption Scheme with
Key Sequences Derived from Random Sequence of
Cyclic Elliptic Curve Points. International Journal of
Network Security, 12(3), 137-150.