This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abd El-Latif, A.A. and Niu, X. 2013. A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU—International Journal of Electronics and Communications 67(2).Abd El-LatifA.A.NiuX.2013A hybrid chaotic system and cyclic elliptic curve for image encryptionAEU—International Journal of Electronics and Communications67210.1016/j.aeue.2012.07.004Search in Google Scholar
Ahmad, J., Khan, M.A., Hwang, S.O. and Khan, J.S. 2017. A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Computing and Applications 28(S1): 953–967.AhmadJ.KhanM.A.HwangS.O.KhanJ.S.2017A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matricesNeural Computing and Applications28S195396710.1007/s00521-016-2405-6Search in Google Scholar
Alleaume, R., Branciard, C., Bouda, J., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Langer, T., Lutkenhaus, N., Monyk, C., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H. and Zeilinger, A. 2014. Using quantum key distribution for cryptographic purposes: a survey. Theoretical Computer Science 560: 62–81.AlleaumeR.BranciardC.BoudaJ.DebuisschertT.DianatiM.GisinN.GodfreyM.GrangierP.LangerT.LutkenhausN.MonykC.PainchaultP.PeevM.PoppeA.PorninT.RarityJ.RennerR.RibordyG.RiguidelM.SalvailL.ShieldsA.WeinfurterH.ZeilingerA.2014Using quantum key distribution for cryptographic purposes: a surveyTheoretical Computer Science560628110.1016/j.tcs.2014.09.018Search in Google Scholar
Al-Maadeed, S., Al-Ali, A. and Abdalla, T. 2012. A new chaos-based image-encryption and compression algorithm. Journal of Electrical and Computer Engineering 2012: 1–11.Al-MaadeedS.Al-AliA.AbdallaT.2012A new chaos-based image-encryption and compression algorithmJournal of Electrical and Computer Engineering201211110.1155/2012/179693Search in Google Scholar
Ayele, A.A. and Screenivasarao, V. 2013. A modified RSA encryption technique based on multiple public keys. International Journal of Innovative Research in Computer and Communication Engineering 1(4): 859–864.AyeleA.A.ScreenivasaraoV.2013A modified RSA encryption technique based on multiple public keysInternational Journal of Innovative Research in Computer and Communication Engineering14859864Search in Google Scholar
Belazi, A., Abd El-Latif, A.A., Diaconu, A.-V., Rhouma, R. and Belghith, S. 2017. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Optics and Lasers in Engineering 88: 37–50.BelaziA.Abd El-LatifA.A.DiaconuA.-V.RhoumaR.BelghithS.2017Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transformsOptics and Lasers in Engineering88375010.1016/j.optlaseng.2016.07.010Search in Google Scholar
Boriga, R., Dascalescu, A.C. and Priescu, I. 2014. A new hyperchaotic map and its application in an image encryption scheme. Signal Processing: Image Communication 29(8): 887–901.BorigaR.DascalescuA.C.PriescuI.2014A new hyperchaotic map and its application in an image encryption schemeSignal Processing: Image Communication29888790110.1016/j.image.2014.04.001Search in Google Scholar
Bull, D.R. 2014. Communicating pictures: a course in image and video coding. Academic Press, New York.BullD.R.2014Communicating pictures: a course in image and video codingAcademic PressNew York10.1016/B978-0-12-405906-1.00013-1Search in Google Scholar
Chen, J., Zhou, J. and Wong, K.-W. 2011. A modified chaos-based joint compression and encryption scheme. IEEE Transactions on Circuits and Systems II Express Briefs 58(2): 110–114.ChenJ.ZhouJ.WongK.-W.2011A modified chaos-based joint compression and encryption schemeIEEE Transactions on Circuits and Systems II Express Briefs58211011410.1109/TCSII.2011.2106316Search in Google Scholar
Chen, T., Zhang, M., Wu, J., Yuen, C. and Tong, Y. 2016. Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling. Optics & Laser Technology 84: 118–133.ChenT.ZhangM.WuJ.YuenC.TongY.2016Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scramblingOptics & Laser Technology8411813310.1016/j.optlastec.2016.05.012Search in Google Scholar
Chen, W., Wang, T. and Wang, B. 2014. Design of digital image encryption algorithm based on mixed chaotic sequences. International Journal on Smart Sensing and Intelligent Systems 7(4): pp. 1453–1469.ChenW.WangT.WangB.2014Design of digital image encryption algorithm based on mixed chaotic sequencesInternational Journal on Smart Sensing and Intelligent Systems741453146910.21307/ijssis-2017-715Search in Google Scholar
Deng, J., Zhao, S., Wang, Y., Wang, L., Wang, H. and Sha, H. 2017. Image compression–encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimedia Tools and Applications 76(7): 10097–10117.DengJ.ZhaoS.WangY.WangL.WangH.ShaH.2017Image compression–encryption scheme combining 2D compressive sensing with discrete fractional random transformMultimedia Tools and Applications767100971011710.1007/s11042-016-3600-2Search in Google Scholar
Dhenakaran, S.S. and Ilayaraja, M. 2012. Extension of playfair cipher using 16X16 matrix. International Journal of Computer Application 48(7): 37–41.DhenakaranS.S.IlayarajaM.2012Extension of playfair cipher using 16X16 matrixInternational Journal of Computer Application487374110.5120/7363-0192Search in Google Scholar
Fira, M. 2015. Applications of compressed sensing: compression and encryption. 2015 E-Health andBioengineering Conference (EHB), pp. 1–4.FiraM.2015Applications of compressed sensing: compression and encryption2015 E-Health andBioengineering Conference (EHB), pp.14Search in Google Scholar
Goel, N., Raman, B. and Gupta, I. 2014. Chaos based joint compression and encryption framework for end-to-end communication systems. Advances in Multimedia 2014: 1–10.GoelN.RamanB.GuptaI.2014Chaos based joint compression and encryption framework for end-to-end communication systemsAdvances in Multimedia201411010.1155/2014/910106Search in Google Scholar
Gupta, K. and Silakari, S. 2012. Novel approach for fast compressed hybrid color image cryptosystem. Advances in Engineering Software 49(1): 29–42.GuptaK.SilakariS.2012Novel approach for fast compressed hybrid color image cryptosystemAdvances in Engineering Software491294210.1016/j.advengsoft.2012.03.001Search in Google Scholar
Hamdi, M., Rhouma, R. and Belghith, S. 2017. A selective compression–encryption of images based on SPIHT coding and Chirikov Standard Map. Signal Processing 131: 514–526.HamdiM.RhoumaR.BelghithS.2017A selective compression–encryption of images based on SPIHT coding and Chirikov Standard MapSignal Processing13151452610.1016/j.sigpro.2016.09.011Search in Google Scholar
Hassan, N.S. and Younis, H.A. 2013. Approach for partial encryption of compressed images. Journal of Babylon University Application Science 21(3): 1–10.HassanN.S.YounisH.A.2013Approach for partial encryption of compressed imagesJournal of Babylon University Application Science213110Search in Google Scholar
Hua, Z. and Zhou, Y. 2017. Design of image cipher using block-based scrambling and image filtering. Information Sciences (NY). 396: 97–113.HuaZ.ZhouY.2017Design of image cipher using block-based scrambling and image filteringInformation Sciences (NY).3969711310.1016/j.ins.2017.02.036Search in Google Scholar
Huang, R., Rhee, K.H.H. and Uchida, S. 2014. A parallel image encryption method based on compressive sensing. Multimedia Tools and Applications 72(1): 71–93.HuangR.RheeK.H.H.UchidaS.2014A parallel image encryption method based on compressive sensingMultimedia Tools and Applications721719310.1007/s11042-012-1337-0Search in Google Scholar
Jolfaei, A. and Mirghadri, A. 2011. Image encryption using chaos and block cipher. Computer and Information Science 4(1): 172–185.JolfaeiA.MirghadriA.2011Image encryption using chaos and block cipherComputer and Information Science4117218510.5539/cis.v4n1p172Search in Google Scholar
Karthikeyan, T., Praburaj, B. and Kesavapandian, K. 2014. Embedded zero tree wavelet and orthogonal polynomial based transformation coding. Journal of Theoretical and Applied Information Technology 68(1): 215–223.KarthikeyanT.PraburajB.KesavapandianK.2014Embedded zero tree wavelet and orthogonal polynomial based transformation codingJournal of Theoretical and Applied Information Technology681215223Search in Google Scholar
Koops, B. 1999. The crypto controversy a key conflict in the information society. Kluwer Law International, The Netherlands.KoopsB.1999The crypto controversy a key conflict in the information societyKluwer Law InternationalThe NetherlandsSearch in Google Scholar
Kumar, M. and Vaish, A. 2016. Prediction error based compression of color images using WDR coding. AEU—International Journal of Electronics and Communications 70(9): 1164–1171.KumarM.VaishA.2016Prediction error based compression of color images using WDR codingAEU—International Journal of Electronics and Communications7091164117110.1016/j.aeue.2016.05.014Search in Google Scholar
Kumar, M. and Vaish, A. 2017. An efficient encryption-then-compression technique for encrypted images using SVD. Digital Signal Processing 60: 81–89.KumarM.VaishA.2017An efficient encryption-then-compression technique for encrypted images using SVDDigital Signal Processing60818910.1016/j.dsp.2016.08.011Search in Google Scholar
Li, P. and Lo, K. 2015. Joint image compression and encryption based on alternating transforms with quality control. in 2015 Visual Communications and Image Processing (VCIP), pp. 1-4.LiP.LoK.2015Joint image compression and encryption based on alternating transforms with quality controlin 2015 Visual Communications and Image Processing (VCIP), pp. 1-410.1109/VCIP.2015.7457867Search in Google Scholar
Mahaveerakannan, R. and Dhas, C.S.G. 2016. Customized RSA public key cryptosystem using digital signature of secure data transfer natural number algorithm. International Journal of Circuit Theory and Applications 9(5): 2627–2632.MahaveerakannanR.DhasC.S.G.2016Customized RSA public key cryptosystem using digital signature of secure data transfer natural number algorithmInternational Journal of Circuit Theory and Applications9526272632Search in Google Scholar
Morales-Sandoval, M. and Feregrino-Uribe, C. 2005. A hardware architecture for elliptic curve cryptography and lossless data compression. 15th International Conference on Electronics, Communications and Computers (CONIELECOMP'05), pp. 113–118.Morales-SandovalM.Feregrino-UribeC.2005A hardware architecture for elliptic curve cryptography and lossless data compression15th International Conference on Electronics, Communications and Computers (CONIELECOMP'05), pp.113118Search in Google Scholar
Munir, R. 2012. Security analysis of selective image encryption algorithm based on chaos and CBC-like mode. 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), no. 2, pp. 142–146.MunirR.2012Security analysis of selective image encryption algorithm based on chaos and CBC-like mode2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), no. 2142146Search in Google Scholar
Murillo-Escobar, M.A., Cruz-Hernandez, C., Abundiz-Perez, F., Lopez-Gutierrez, R.M. and Acosta Del Campo, O.R. 2015. A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Processing 109: 119–131.Murillo-EscobarM.A.Cruz-HernandezC.Abundiz-PerezF.Lopez-GutierrezR.M.Acosta Del CampoO.R.2015A RGB image encryption algorithm based on total plain image characteristics and chaosSignal Processing10911913110.1016/j.sigpro.2014.10.033Search in Google Scholar
Patrick, T.K. 2011. One way functions and public key cryptography. African Journal of Mathematics and Computer Science Research 4(6): 213–216.PatrickT.K.2011One way functions and public key cryptographyAfrican Journal of Mathematics and Computer Science Research46213216Search in Google Scholar
Rahmawati, W.M., Saikhu, A. and Kompresi, A.E. 2013. Implementasi Algoritma Penggabungan Kompresi dan Enkripsi Citra dengan DCT dan SHA-1. J. Tek. POMITS 2(1): 1–4.RahmawatiW.M.SaikhuA.KompresiA.E.2013Implementasi Algoritma Penggabungan Kompresi dan Enkripsi Citra dengan DCT dan SHA-1J. Tek. POMITS2114Search in Google Scholar
Santhosh, M., Charles, B.S. and Giriprasad, M.N. 2013. Lossless image compression using new biorthogonal wavelets. Signal and Image Processing: An International Journal 4(6): 4553.SanthoshM.CharlesB.S.GiriprasadM.N.2013Lossless image compression using new biorthogonal waveletsSignal and Image Processing: An International Journal464553Search in Google Scholar
Santoso, A.J., Nugroho, L.E., Suparta, G.B. and Hidayat, R. 2011. Color image compression using orthogonal wavelet viewed from decomposition level and peak signal to noise ratio. International Journal of Advanced Science and Technology 31: 81–92.SantosoA.J.NugrohoL.E.SupartaG.B.HidayatR.2011Color image compression using orthogonal wavelet viewed from decomposition level and peak signal to noise ratioInternational Journal of Advanced Science and Technology318192Search in Google Scholar
Setyaningsih, E. and Harjoko, A. 2017. Survey of hybrid image compression techniques. International Journal of Electrical and Computer Engineering 7(4): 2206–2214.SetyaningsihE.HarjokoA.2017Survey of hybrid image compression techniquesInternational Journal of Electrical and Computer Engineering742206221410.11591/ijece.v7i4.pp2206-2214Search in Google Scholar
Setyaningsih, E. and Wardoyo, R. 2017. Review of image compression and encryption techniques. International Journal of Advanced Computer Science and Applications 8(2): 83–94.SetyaningsihE.WardoyoR.2017Review of image compression and encryption techniquesInternational Journal of Advanced Computer Science and Applications82839410.14569/IJACSA.2017.080212Search in Google Scholar
Sharadha, R. and Bhanuprakash, C. 2013. Image compression technique for color images using wavelets. International Journal of Advanced. Research in Computer Science and Software Engineering 3(11): 322327.SharadhaR.BhanuprakashC.2013Image compression technique for color images using waveletsInternational Journal of Advanced. Research in Computer Science and Software Engineering311322327Search in Google Scholar
Sharma, S. 2012. Modified RSA public key cryptosystem using short range natural number algorithm. International Journal of Advanced. Research in Computer Science and Software Engineering 2(8): 134138.SharmaS.2012Modified RSA public key cryptosystem using short range natural number algorithmInternational Journal of Advanced. Research in Computer Science and Software Engineering28134138Search in Google Scholar
Somani, N. and Mangal, D. 2014. An improved RSA cryptographic system. International Journal of Computer Application 105(16): 18–22.SomaniN.MangalD.2014An improved RSA cryptographic systemInternational Journal of Computer Application105161822Search in Google Scholar
Teng, L., Wang, X. and Meng, J. 2017. A Chaotic color image encryption using integrated bit-level permutation. Multimedia Tools and Applications, pp. 1–14.TengL.WangX.MengJ.2017A Chaotic color image encryption using integrated bit-level permutationMultimedia Tools and Applications11410.1007/s11042-017-4605-1Search in Google Scholar
Tong, X.-J., Chen, P. and Zhang, M. 2017. A joint image lossless compression and encryption method based on chaotic map. Multimedia Tools and Applications 76(12): 13995–14020.TongX.-J.ChenP.ZhangM.2017A joint image lossless compression and encryption method based on chaotic mapMultimedia Tools and Applications7612139951402010.1007/s11042-016-3775-6Search in Google Scholar
Tong, X.-J., Wang, Z., Zhang, M. and Liu, Y. 2013. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dynamics 72(1-2): 229–241.TongX.-J.WangZ.ZhangM.LiuY.2013A new algorithm of the combination of image compression and encryption technology based on cross chaotic mapNonlinear Dynamics721-222924110.1007/s11071-012-0707-5Search in Google Scholar
Vaish, A., Gautam, S. and Kumar, M. 2017. A wavelet based approach for simultaneous compression and encryption of fused images. Journal of King Saud Univ.—Computer and Information Science, pp. 1–10.VaishA.GautamS.KumarM.2017A wavelet based approach for simultaneous compression and encryption of fused imagesJournal of King Saud Univ.—Computer and Information Science11010.1016/j.jksuci.2017.01.005Search in Google Scholar
Wang, B. and Gao, Y. 2015. An image compression scheme based on fuzzy neural network. TELKOMMNIKA (Telecommunication Computing Electronics and Control) 13(1): 137.WangB.GaoY.2015An image compression scheme based on fuzzy neural networkTELKOMMNIKA (Telecommunication Computing Electronics and Control)13113710.12928/telkomnika.v13i1.1270Search in Google Scholar
Wang, C., Ni, J. and Huang, Q. 2015. A new encryption then compression algorithm using the rate distortion optimization. Signal Processing: Image Communication 39: 141–150.WangC.NiJ.HuangQ.2015A new encryption then compression algorithm using the rate distortion optimizationSignal Processing: Image Communication3914115010.1016/j.image.2015.09.009Search in Google Scholar
Wang, X. and Zhao, J. 2010. An improved key agreement protocol based on chaos. Communications in Nonlinear Science and Numerical Simulation 15(12): 4052–4057.WangX.ZhaoJ.2010An improved key agreement protocol based on chaosCommunications in Nonlinear Science and Numerical Simulation15124052405710.1016/j.cnsns.2010.02.014Search in Google Scholar
Wang, X., Liu, L. and Zhang, Y. 2015. A novel chaotic block image encryption algorithm based on dynamic random growth technique. Optics and Lasers in Engineering 66: 10–18.WangX.LiuL.ZhangY.2015A novel chaotic block image encryption algorithm based on dynamic random growth techniqueOptics and Lasers in Engineering66101810.1016/j.optlaseng.2014.08.005Search in Google Scholar
Xiang, T., Qu, J. and Xiao, D. 2014. Joint SPIHT compression and selective encryption. Applied Soft Computing 21: 159–170.XiangT.QuJ.XiaoD.2014Joint SPIHT compression and selective encryptionApplied Soft Computing2115917010.1016/j.asoc.2014.03.009Search in Google Scholar
Xiaoyong, J., Sen, B., Guibin, Z. and Bing, Y. 2017. Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps. Multimedia Tools and Applications 76(10): 12965–12979.XiaoyongJ.SenB.GuibinZ.BingY.2017Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic mapsMultimedia Tools and Applications7610129651297910.1007/s11042-016-3684-8Search in Google Scholar
Younes, M.A.B. and Jantan, A. 2008. Image encryption using block-based transformation algorithm. International Journal of Computer Science 35(1): 1–9.YounesM.A.B.JantanA.2008Image encryption using block-based transformation algorithmInternational Journal of Computer Science35119Search in Google Scholar
Zhang, M. and Tong, X. 2017. Joint image encryption and compression scheme based on IWT and SPIHT. Optics and Lasers in Engineering. 90: 254–274.ZhangM.TongX.2017Joint image encryption and compression scheme based on IWT and SPIHTOptics and Lasers in Engineering.9025427410.1016/j.optlaseng.2016.10.025Search in Google Scholar
Zhang, Y., Xu, B. and Zhou, N. 2017. A novel image compression–encryption hybrid algorithm based on the analysis sparse representation. Optics Communications 392: 223–233.ZhangY.XuB.ZhouN.2017A novel image compression–encryption hybrid algorithm based on the analysis sparse representationOptics Communications39222323310.1016/j.optcom.2017.01.061Search in Google Scholar
Zhou, N., Zhang, A., Zheng, F. and Gong, L. 2014. Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Optics and Laser Technology 62: 152–160.ZhouN.ZhangA.ZhengF.GongL.2014Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensingOptics and Laser Technology6215216010.1016/j.optlastec.2014.02.015Search in Google Scholar
Zhu, Z., Zhang, W., Wong, K. and Yu, H. 2011. A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences (NY). 181(6): 1171–1186.ZhuZ.ZhangW.WongK.YuH.2011A chaos-based symmetric image encryption scheme using a bit-level permutationInformation Sciences (NY).18161171118610.1016/j.ins.2010.11.009Search in Google Scholar