Multiple-Image Fusion Encryption (MIFE) Using Discrete Cosine Transformation (DC. 16
Multiple-Image Fusion Encryption (MIFE) Using Discrete Cosine Transformation (DC. 16
Search
Close
Books
Book Series
Journals
Publish
About
News
LOGIN
What is Open Access?
Open Access is an initiative that aims to make scientific research freely available to all. To date our community has made over 100 million downloads.
It’s based on principles of collaboration, unobstructed discovery, and, most importantly, scientific progression. As PhD students, we found it di!cult
to access the research we needed, so we decided to create a new Open Access publisher that levels the playing field for scientists across the world. How?
By making research easy to access, and puts the academic needs of the researchers before the business interests of publishers.
Our Authors and Editors
We are a community of more than 103,000 authors and editors from 3,291 institutions spanning 160 countries, including Nobel Prize winners and some
of the world’s most-cited researchers. Publishing on IntechOpen allows authors to earn citations and find new collaborators, meaning more people see
your work not only from your own field of study, but from other related fields too.
Content Alerts
Brief introduction to this section that descibes Open Access especially from an IntechOpen perspective
How it Works Manage preferences
Contact
Want to get in touch? Contact our London head o!ce or media team here
Careers
Our team is growing all the time, so we’re always on the lookout for smart people who want to help us reshape the world of scientific publishing.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 1 of 36
:
(MIFE) Using Discrete Cosine
Transformation (DCT) and Pseudo
Random Number Generators
Submitted: 29 February 2020 , Reviewed: 03 April 2020 , Published: 30 June 2020
DOI: 10.5772/intechopen.92369
W R I T T E N BY
Lee Mariel Heucheun Yepdia, Alain Tiedeu and Zied Lachiri
R E G I ST E R TO D O W N LOA D F O R F R E E
Share Cite
ADVERTISEMENT
BSV Blockchain
A comprehensive approach to DOWNLOAD
blockchain energy efficiency
Abstract
This chapter proposes a new multiple-image encryption algorithm based on
spectral fusion of watermarked images and new chaotic generators. Logistic-
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 2 of 36
:
May (LM), May-Gaussian (MG), and Gaussian-Gompertz (GG) were used as
chaotic generators for their good properties in order to correct the flaws of 1D
chaotic maps (Logistic, May, Gaussian, Gompertz) when used individually.
Firstly, the discrete cosine transformation (DCT) and the low-pass filter of
appropriate sizes are used to combine the target watermarked images in the
spectral domain in two di"erent multiplex images. Secondly, each of the two
images is concatenated into blocks of small size, which are mixed by changing
their position following the order generated by a chaotic sequence from the
Logistic-May system (LM). Finally, the fusion of both scrambled images is
achieved by a nonlinear mathematical expression based on Cramer’s rule to
obtain two hybrid encrypted images. Then, after the decryption step, the
hidden message can be retrieved from the watermarked image without any
loss. The security analysis and experimental simulations confirmed that the
proposed algorithm has a good encryption performance; it can encrypt a large
number of images combined with text, of di"erent types while maintaining a
reduced Mean Square Error (MSE) after decryption.
Keywords
1. Introduction
Several image encryption algorithms are being developed today to meet
privacy needs in multimedia communications [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12,
13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33]. With
the rapid expansion of the Internet, innovative technologies, and
cryptanalysis, it has become necessary to build new and appropriate
cryptosystems for secured data transfer, especially for digital images.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 3 of 36
:
Nowadays, a large quantity of images is produced in various fields and
exchanged sometimes with text through di"erent channels, favoring the
development of multiple-image encryption (MIE) instead of single-image
encryption (SIE). A secure technique to protect the large amounts of data
(image and text) exchanged in unsecured communication channels is to
combine cryptography and watermarking [26, 27]. These two combined
approaches help to produce a two-level security of the text and image,
especially when the message is hidden in the image to be encrypted. Various
watermarking techniques are proposed in the literature [28, 29, 30, 31, 32], and
the most used are discrete wavelet transformation (DWT) and discrete cosine
transformation (DCT). For instance, if an information, such as a signature, a
logo, or a text is embedded in low- or medium-frequency DCT coe!cients,
then it may be recovered without any loss; however, only high-frequency DCT
coe!cients are lost in low-pass filtering.
Among the chaotic encryption algorithms developed, the ones using a one-
dimensional (1D) chaotic system like Logistic, May, Tent, and Sine map have
proven to have some strengths, such as: high-level e!ciency, simplicity, and
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 4 of 36
:
high-speed encryption. 1D chaotic structures have been widely used [4] due to
their simple structures, as opposed to the complex ones of higher dimensional
chaotic system (which causes a relative slowness in computation). However,
some schemes using the 1D map have been broken due to their weaknesses like
nonuniform data output, small key space, periodic data output, and poor
ergodicity properties for some ranges of control parameters [5, 6]. To
overcome this drawback, some researchers stated that the 1D chaotic map
should not be used alone [7, 8]. Others proposed new 1D chaotic systems with
better properties like Spatiotemporal chaos in [9], coupled with the 1D chaotic
map [6], the Nonlinear Chaotic map Algorithm (NCA) [10], and, more
recently, nonlinear combinations of two di"erent 1D chaotic maps [3, 11, 12].
For example, Abanda and Tiedeu [3] combined outputs of Du!ng and
Colpitts chaotic systems to encrypt gray and color images. Kamdeu and Tiedeu
[11] proposed a fast and secured encryption scheme using new 1D chaotic
systems obtained from Logistic, May, Gaussian, and Gompertz maps. In [12],
Chenaghlu et al. proposed a polynomial combination of 1D chaotic maps for
image encryption using dynamic functions generation.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 5 of 36
:
the number of images to multiplex increases, but su"ered from reduced key
space and poor quality of images recovered. Mehra and Nishchal [17] proposed
an image fusion encryption based on wavelets for securing multiple images
through asymmetric keys. It o"ers a large key space, which enhances the
security of the system. In 2016, Qin et al. [18] proposed an optical multiple-
image encryption scheme in di"ractive imaging using spectral fusion and
nonlinear operations.
More recently, Zhang and Wang [19, 20] proposed two schemes of multiple-
image encryption (MIE): the first algorithm based on mixed image element
and permutation, and the second MIE algorithm based on mixed image
element and chaos. The cryptosystem shows good performances, but can be
improved in terms of compression to reduce the size of the multiplex big
image when the number of target images increases. In [21], Zhu and Zhang
proposed an encryption algorithm of mixed image element based on an elliptic
curve cryptosystem. Experimental results and theoretical analysis show that
the algorithm possesses a large key space and can accomplish a high level of
security concerning information interaction on the network platform, but the
encryption and decryption computational time is long. In 2013, Abdalla and
Tamimi [22] proposed a cryptosystem, which combines two or more images of
di"erent types and sizes by using a shu$ing-substitution procedure. Here, the
process of mixing image combines stream cipher with block cipher, on the
byte level.
After analyzing most MIE algorithms operating in the spectral domain, the
robustness of the cryptosystem increases with the number of input images.
Consequently, the quality of decrypted images is degraded. Therefore, it is
important to design cryptosystems that can keep a good compromise between
a large number of images added to text to encrypt, a small MSE after
decryption, and a good performance in terms of robustness and e!ciency.
As a result, this chapter suggests a new MIE algorithm based on the spectral
fusion of di"erent types of watermarked images of same size using discrete
cosine transformation (DCT) associated with a low-pass filter and chaotic
maps. The proposed scheme has several strengths: it is robust, combines
watermarking and cryptography, which produce a two-level security, uses
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 6 of 36
:
chaotic maps with good properties, encrypts a large number of watermarked
images into two hybrid ciphered images, and the quality of the reconstructed
images and text is good (reduced MSE). The encryption process comprises
three main steps: in the first step, target images are fused into two images
through DCT and low-pass filter; in the second step, the small blocks with the
size of (4 × 4) images are permuted in a certain order; and in the last step,
which is the di"usion phase, the two scrambled images are fused by a
nonlinear mathematical expression based on Cramer’s rule to obtain two
hybrid encrypted images. The key generation of the cryptosystem is made
dependent on the plain images.
A DV E RT I S E M E N T
xn+1 = rx n (1 − xn ) E1
where xn ∈ [0, 1] is the discrete state of the output chaotic sequence and r is
the control parameter with values in the range (0, 4]. The chaotic behavior of
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 7 of 36
:
the Logistic map is observed in the range [3.5, 4].
xn+1 = xn exp (a (1 − xn )) E2
where xn ∈ [0, 10.9] and the control parameter a belongs to the range [0, 5].
xn+1 = − bxn ln xn E4
where the control parameter b ∈ (0, e ], e = 2.71829… and is the exponential
function.
The chaotic properties of 1D Logistic, May, Gaussian, and Gompertz maps are
not suitable to build a secure cryptosystem when they are used alone. To solve
this problem, Zhou et al. [23] proposed to combine the di"erent seed maps.
Figure 1 shows the new map obtained from a nonlinear combination of two
di"erent 1D chaotic maps.
Figure 1.
New chaotic scheme.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 8 of 36
:
2.2.1 Logistic-May map (LM)
2.2.3 Gaussian-Gompertz
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 9 of 36
:
generators, we performed the NIST statistical tests. Analysis of these results
(see Table 1) showed that all the 15 tests were congruent for the three chaotic
maps.
Figure 2.
Bifurcation diagrams and Lyaponuv exponent graphics of combined chaotic maps, (a)
and (d) logistic-may, (b) and (e) May-Gaussian, (c) and (f) Gaussian-Gompertz.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 10 of 36
:
FFT 0.87531 97/100 0.89678 98/100 0.82670 98/100
Nonoverlapping-
0.78951 100/100 0.75091 99/100 0.77856 98/100
templates
Random-excursions
0.14358 58/60 0.13871 57/60 0.15120 59/60
Variant
Table 1.
Statistical NIST tests results of 1,000,000 bits.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 11 of 36
:
for all pixels in the block considered from the host image; Ds represents the
di"erence sum for all the pixels used in the block; and α is a constant threshold
value selected. The value of α must be high to ensure the most hidden message
imperceptibility in the watermarked image; α є [0, 255].
Figure 3.
Results of the watermarked process. (a) Host image (512
×512) , (b) watermark (64
×64), (c) watermarked image, (d) recovered watermark.
In order to protect the watermarked and host image from unauthorized access
and noise attack, the watermarked image was encrypted with other images in a
mixed process.
In this section, N target images of size (M , M ) are combined into two images,
each containing {N /2} target images. As described in [24], discrete cosine
transformation (DCT) is first applied separately to each of the target images.
In the second step, every spectrum is multiplied by a low-pass filter, of size
(M’, M’) pixels, as indicated in Figure 4. In this manner, it is possible to
reconstruct every target image through the relevant information contained in
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 12 of 36
:
each block. At this step, the compression rate Cp is:
Figure 4.
Spectral fusion of target images.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 13 of 36
:
Figure 5.
Encryption scheme.
A. Blocks-permutation
The plain image is each of the two multiplex images obtained in Section 3. The
plain image is decomposed into small blocks of the same size; let us choose
blocks size of (4 × 4 ) pixels. In fact, increasing the number of blocks by using
smaller block size resulted in a lower correlation and higher entropy; then, the
intelligible information contained in the image will be reduced.
Use initial condition and control parameters x01, r01 of Logistic-May system to
generate a chaotic sequence by iterating k times Eq. (5). The values of the
sequence X obtained are ranged in a row vector P of size (1, k) .
Repeat step 2 to generate a new sequence, using new initial condition and
control parameters x02 and r02. This second sequence is to permute the small
blocks of the second multiplex image.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 14 of 36
:
Sort the chaotic sequence P in ascending order, and get a new sequence
P ' = {Pt′ }k = {Pt1′ ; Pt2′ , … Ptk′ } . Therefore, the sequence x01, r01, x02, r02 is
the permutation of the sequence 1, 2,…, k.
Number all the blocks of the plain image obtained in step 1, and adjust their
positions with the previous permutation of step 3. Then, the image obtained is
a block image permuted.
The values x01, r01, x02, r02 are calculated through Eqs. (9) and (10). In this
process, we subdivide each multiplex image Ii, (i = 1, 2) in two parts, P1 and P2
of same size.
At this level, the two scrambled images are combined in order to create the
final hybrid encrypted images that would be di!cult to crack. The May-
Gaussian and Gaussian-Gompertz systems in Eqs. (6) and (7) are used as
pseudo random generators to generate two chaotic sequences after 2 M × 2 M
iterations. These values are arranged in two arrays W and T of sizes 2 M × 2 M,
respectively, where M represents the number of rows and columns of each
scrambled image. W and T are converted into real values in unit 8 format;
(W = uint8(W× 255); T = uint8(T× 255)). The initial conditions and control
parameters of the two pseudo random numbers generators are xp1,rp1 and xp2,
rp2, α, respectively, for May-Gaussian and Gaussian-Gompertz systems. These
parameters are determined with Eqs. (11) and (12).
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 15 of 36
:
E13
The arrays W and T are divided into four sub-blocks of same size M × M. The
two scrambled images I1 and I2 are linearly combined with the sub-blocks of
W and T using the following equations:
C1 (i, j) = [w11 × I1 (i, j) + w12 × I2 (i, j)) mod 256 ⊕ floor (t11 × t21 ) × 1015 )]
E14
C2 (i, j) = [w21 × I1 (i, j) + w22 × I2 (i, j)) mod 256 ⊕ floor (t12 × t22 ) × 1015 )]
E15
where C1 (i, j) and C2 (i, j) are the two encrypted hybrid images of the
cryptosystem, and ⊕ is the bit wise XOR operator. The mixed product tij × tji
in the above relations enhances the quality of the merged images.
In the decryption process, the encrypted images are first decomposed using
Cramer’s rule in order to recover the scrambled images. Knowing the fusion
keys (xp1, rp1, xp2, rp2, α), the receiver can get the images I1 and I2 by solving
the system of equations below:
(I1 [i, j] × w11 + I2 [i, j] × w12 )mod 256 = C1 (floor (t11 × t21 ) × 1015 )
{
(I1 [i, j] × w21 + I2 [i, j] × w22 )mod 256 = C2 (floor (t12 × t22 ) × 1015 )
Then, the two multiplex images can be obtained easily by decrypting I1 and I2
through reverse permutation operations.
A DV E RT I S E M E N T
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 16 of 36
:
Voorkom Dure Herstellingen! Los
Je Lekkende Dak Nu Op
Fix jouw lekkend dak nu om rampzalige schade te
voorkomen...
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 17 of 36
:
Figure 6.
Plain and combined images. (a–d) Images combined in multiplex image 1, (e–h) images
combined in multiplex image 2, (i) multiplex image 1 before IDCT, (j) multiplex image 1
after IDCT.
The size of the filter (M’, M’) and the number of target images N constitute
additional parameters of the key.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 18 of 36
:
3.1.1 Histogram
Figure 7.
Encrypted images and their histograms. (a) Multiplexed image 1, (b) multiplexed image
2.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 19 of 36
:
Figure 8.
Plot of correlation coe!cients in horizontal, vertical, and diagonal directions of plain
and cipher cameraman (512 × 512). (a, c, e) correlation coe!cients of plain images in
horizontal, vertical, and diagonal directions respectively. (b, d, f) correlation
coe!cients of ciphered images in horizontal, vertical, and diagonal directions
respectively.
(, )
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 20 of 36
:
∑i,j D(i,j)
NPCR = W×H
× 100% E17
[∑ ]
1 |C1 (i,j)−C2 (i,j)|
UACI = W×H 255
× 100% E18
i,j
K×∑K K 2 K 2
i=1 Xi Yi−∑i=1 Xi ×∑i=1 Yi
Crxy = E19
√ (K×∑K
2 2
i=1 (Xi ) −(∑i=1 Xi ) )×(K×∑i=1 (Yi) −(∑i=1 Yi) )
2 K K 2 K
where X and Y are the values of two adjacent pixels in the image, Crxy belongs
to the range [−1, 1] and K denotes the number of pairs of pixels randomly
selected. Crxy tends to be 1 or − 1 for strong correlation and tends to be 0 for
every poor correlation. Table 2 shows the calculated correlation coe!cient of
512 × 512 cameraman and peppers images in every direction. A mean value of
the proposed encryption algorithm is about 0.0032, which tends to be zero,
which is the expected value. The same result can be confirmed in Figure 8,
where the pixels of encrypted images are not correlated in di"erent directions.
Then, these results prove that attacks based on correlation analysis cannot
succeed on the proposed cryptosystem.
HC 0.9314 0.0023
DC 0.8931 −0.003
HC 0.9934 0.0013
DC 0.9919 0.0044
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 21 of 36
:
Table 2.
Correlation coe!cient.
2M −1
S (m) = ∑ p (mi ) log2 ( 1 ) E20
p( ) mi
i=0
where p (mi ) is the probability of the recurrence of element mi and M denotes
the number of bits of information m. The ideal entropy value of a 256-
grayscale image represented on 8 bits with equal probability is 8. Table 3 shows
entropy values of the two multiplex images of the proposed encryption
Chapter sections
algorithm very close to 8, as expected.
SPECIAL
Multiplex image 1 OFFER! 7.9993 — —
Applies to all print copy prices | Offer ends 15 December 2024
Enter the code 20PRINT to unlock the offer
Multiplex image 2 7.9993 7.9993 7.9992
Table 3.
Information entropy of some ciphered images.
Key space size is the total number of di"erent keys that can be used in an
encryption algorithm. A good encryption algorithm needs to contain
su!ciently large key space to make the brute-force attack infeasible. The high
sensitivity to initial conditions inherent to any chaotic system, that is,
exponential divergence of chaotic trajectories, ensures high security [11].
30
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 22 of 36
:
In literature, a key space of at least 1030 is required for the system to be robust
[19]. The proposed encryption algorithm actually does have some of the
following secret keys: the initial values x01, x02, xp1, xp2 and control parameters
r01, r02, rp1, rp2 and α of the chaotic systems used; the number N of target
images and the size M ' × M ' of the filter. We suppose that the computer
precision is 10−15, so the key space is greater than 1015 × 9 = 10135. Therefore, this
key space is large enough to resist the brute-force attack. Moreover, key
sensitivity analysis has been carried out, but the results are not presented here
for reasons of space. These results confirm that by changing only one bit in any
parameter of the key, it is not possible to recover the plain images.
Table 4 gives the measurement of NCPR and UACI between two cipher images
of cameraman, Lena and peppers, when a Least Significant Bit (LSB) changed
on gray value in the last pixel’s position. We can notice that the values obtained
are around the mean of 99.61 for NCPR and 33.49 for UACI. This result shows
that a slight change to the original images will result in a great change in all the
encrypted images. The results also imply that the proposed algorithm has an
excellent ability to resist the di"erential attack.
Image Test
NCPR 99.62
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 23 of 36
:
Multiplex encrypted image 1
UACI 33.54
NCPR 99.63
Multiplex encrypted image 2
UACI 33.47
Table 4.
NCPR AND UACI measure after a LSB change.
∑N M
i=1 ∑j=1 [ID (i,j)−IE (i,j)]
2
NMSE = E21
∑N M
i=1 ∑j=1 [IE (i,j)]
2
where M × N are the size of the image, ID(i, j) and IE(i, j) are the values of the
decrypted image and the original image at the pixel (i, j), respectively. Table 5
presents the values of NMSE for a set of di"erent target images of size 512 ×
512. From this table, we can observe that for N = 16 target images combined in
one multiplex image, that is, 32 images to encrypt by the proposed
cryptosystem, the NMSE is still low, which attests the good quality of
reconstructed images and good performances of the proposed cryptosystem.
Table 5.
NMSE for a set of di"erent target images.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 24 of 36
:
3.4 Encryption/decryption time
Number of images Proposed algorithm [19] (2017) [20] (2017) [24] 2016
Table 6.
Encryption time in seconds.
Proposed 3.7 ×
10135 0.0032 7.9993 99.61 33.49 0.27389
algorithm 10−3
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 25 of 36
:
8.448 ×
Ref. [24] [2016] 1090 — — — — 11.66
10−3
Ref. [25] [2018] 10210 0.0031 7.9986 99.62 33.42 2.386 0.0155
Table 7.
Comparison of the proposed cryptosystem with others.
A DV E RT I S E M E N T
4. Conclusion
In this chapter, an image encryption algorithm based on spectral fusion of
multiple watermarked images and new chaotic generators is proposed.
Logistic-May (LM), Gaussian-Gompertz (GG), and May-Gaussian (MG)
systems were used as chaotic generators in the processes of confusion and
di"usion. The target images were firstly combined in two multiplex images of
same size through DCT and a low-pass filter. Secondly, the previous images are
scrambled by permuting the blocks size of (4 × 4 ) of each multiplex image.
Finally, the later scrambled images are fused by a nonlinear mathematical
expression based on Cramer’s rule to obtain two hybrid encrypted images. At
the decryption step, the watermark hidden in one of the target images is
recovered without loss of information. The evaluation metrics of the proposed
cryptosystem NCPR, UACI, correlation coe!cient, entropy, key space, and
NMSE, are among the best values in literature. More interestingly, the
proposed cryptosystem can encrypt 32 target images simultaneously with a
small NMSE ≈ 4.16 × 10−3 ≈ 3.7 × 10−3, and encrypted images are sensitive
to the key. The proposed encryption algorithm can surely guarantee security
and speed of all types of digital data (text and images) transfer in a digital
network.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 26 of 36
:
A DV E RT I S E M E N T
Acknowledgments
This work was partly supported by ERMIT, Entrepreneurship, Resources,
Management, Innovation and Technologies.
A DV E RT I S E M E N T
Conflict of interest
The authors declare that they have no conflict of interest.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 27 of 36
:
Prodentim
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 28 of 36
:
Women are Losing Weight Fast with this OTC Solution!
Alpilean
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 29 of 36
:
Scientists Discover the Root Cause of Weight Gain
Exipure
References
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 30 of 36
:
6. Wang Y, Liao X, Xiang T, Wong K, Yang D. Cryptanalysis and
improvement on a block cryptosystem based on iteration a chaotic map.
Physique Letters. 2007;A363:277-281
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 31 of 36
:
16. Dongfeng S, Jian H, Yingjian W, Kee Y. Simultaneous fusion, imaging and
encryption of multiple objects using a single-pixel detector. Scientific
Reports. 2017;7:18-29
22. Abdalla A, Tamimi A. Algorithm for image mixing and encryption. The
International Journal of Multimedia & Its Applications (IJMA).
2013;5(2):15-21
23. Zhou Y, Bao L, Chen C. A new 1D chaotic system for image encryption.
Signal Processing. 2014;97:172-182
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 32 of 36
:
26. Al-Haj A, Mohammad A. Crypto-watermarking of transmitted medical
images. Journal of Digital Imaging. 2017;30(1):26-38
30. Singh AK, Dave M, Mohan A. Robust and secure multiple watermarking
in wavelet domain. Journal of Medical Imaging and Health Informatics.
2015;5(2):406-414
31. Lian S, Liu Z, Yuan D, Wang H. On the joint audio fingerprinting and
decryption scheme. In: IEEE International Conference on Multimedia and
Expo; Hannover. 2008. pp. 261-264
W R I T T E N BY
Lee Mariel Heucheun Yepdia, Alain Tiedeu and Zied Lachiri
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 33 of 36
:
Submitted: 29 February 2020 , Reviewed: 03 April 2020 , Published: 30 June 2020
R E G I ST E R TO D O W N LOA D F O R F R E E
Share Cite
© 2020 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative
Commons Attribution 3.0 License, which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work is properly cited.
Multimedia
Information Retrieval
Edited by Eduardo
Quevedo
PUBLISHED: 02 JUNE 2021
Home
News
Contact
SDG Hub
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 34 of 36
:
Careers
About
Scientific Advisors
Team
Events
Advertising
Publish
How it Works
OA Publishing Fees
Peer Review
Editorial Policies
IntechOpen Limited
167-169 Great Portland Street,
London, W1W 5PF,
UNITED KINGDOM
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 35 of 36
:
Terms and Conditions Privacy Policy Customer Complaints
© 2024 IntechOpen. All rights reserved.
https://www.intechopen.com/chapters/72329 21/11/2024, 3 05 PM
Page 36 of 36
: