This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Abd El-Latif, A.A. and Niu, X. 2013. A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU—International Journal of Electronics and Communications 67(2).Abd El-LatifA.A.NiuX.2013A hybrid chaotic system and cyclic elliptic curve for image encryption67210.1016/j.aeue.2012.07.004Search in Google Scholar
Ahmad, J., Khan, M.A., Hwang, S.O. and Khan, J.S. 2017. A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Computing and Applications 28(S1): 953–967.AhmadJ.KhanM.A.HwangS.O.KhanJ.S.2017A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices28S195396710.1007/s00521-016-2405-6Search in Google Scholar
Alleaume, R., Branciard, C., Bouda, J., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Langer, T., Lutkenhaus, N., Monyk, C., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H. and Zeilinger, A. 2014. Using quantum key distribution for cryptographic purposes: a survey. Theoretical Computer Science 560: 62–81.AlleaumeR.BranciardC.BoudaJ.DebuisschertT.DianatiM.GisinN.GodfreyM.GrangierP.LangerT.LutkenhausN.MonykC.PainchaultP.PeevM.PoppeA.PorninT.RarityJ.RennerR.RibordyG.RiguidelM.SalvailL.ShieldsA.WeinfurterH.ZeilingerA.2014Using quantum key distribution for cryptographic purposes: a survey560628110.1016/j.tcs.2014.09.018Search in Google Scholar
Al-Maadeed, S., Al-Ali, A. and Abdalla, T. 2012. A new chaos-based image-encryption and compression algorithm. Journal of Electrical and Computer Engineering 2012: 1–11.Al-MaadeedS.Al-AliA.AbdallaT.2012A new chaos-based image-encryption and compression algorithm201211110.1155/2012/179693Search in Google Scholar
Ayele, A.A. and Screenivasarao, V. 2013. A modified RSA encryption technique based on multiple public keys. International Journal of Innovative Research in Computer and Communication Engineering 1(4): 859–864.AyeleA.A.ScreenivasaraoV.2013A modified RSA encryption technique based on multiple public keys14859864Search in Google Scholar
Belazi, A., Abd El-Latif, A.A., Diaconu, A.-V., Rhouma, R. and Belghith, S. 2017. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Optics and Lasers in Engineering 88: 37–50.BelaziA.Abd El-LatifA.A.DiaconuA.-V.RhoumaR.BelghithS.2017Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms88375010.1016/j.optlaseng.2016.07.010Search in Google Scholar
Boriga, R., Dascalescu, A.C. and Priescu, I. 2014. A new hyperchaotic map and its application in an image encryption scheme. Signal Processing: Image Communication 29(8): 887–901.BorigaR.DascalescuA.C.PriescuI.2014A new hyperchaotic map and its application in an image encryption scheme29888790110.1016/j.image.2014.04.001Search in Google Scholar
Bull, D.R. 2014. Communicating pictures: a course in image and video coding. Academic Press, New York.BullD.R.2014Academic PressNew York10.1016/B978-0-12-405906-1.00013-1Search in Google Scholar
Chen, J., Zhou, J. and Wong, K.-W. 2011. A modified chaos-based joint compression and encryption scheme. IEEE Transactions on Circuits and Systems II Express Briefs 58(2): 110–114.ChenJ.ZhouJ.WongK.-W.2011A modified chaos-based joint compression and encryption scheme58211011410.1109/TCSII.2011.2106316Search in Google Scholar
Chen, T., Zhang, M., Wu, J., Yuen, C. and Tong, Y. 2016. Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling. Optics & Laser Technology 84: 118–133.ChenT.ZhangM.WuJ.YuenC.TongY.2016Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling8411813310.1016/j.optlastec.2016.05.012Search in Google Scholar
Chen, W., Wang, T. and Wang, B. 2014. Design of digital image encryption algorithm based on mixed chaotic sequences. International Journal on Smart Sensing and Intelligent Systems 7(4): pp. 1453–1469.ChenW.WangT.WangB.2014Design of digital image encryption algorithm based on mixed chaotic sequences741453146910.21307/ijssis-2017-715Search in Google Scholar
Deng, J., Zhao, S., Wang, Y., Wang, L., Wang, H. and Sha, H. 2017. Image compression–encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimedia Tools and Applications 76(7): 10097–10117.DengJ.ZhaoS.WangY.WangL.WangH.ShaH.2017Image compression–encryption scheme combining 2D compressive sensing with discrete fractional random transform767100971011710.1007/s11042-016-3600-2Search in Google Scholar
Dhenakaran, S.S. and Ilayaraja, M. 2012. Extension of playfair cipher using 16X16 matrix. International Journal of Computer Application 48(7): 37–41.DhenakaranS.S.IlayarajaM.2012Extension of playfair cipher using 16X16 matrix487374110.5120/7363-0192Search in Google Scholar
Fira, M. 2015. Applications of compressed sensing: compression and encryption. 2015 E-Health andBioengineering Conference (EHB), pp. 1–4.FiraM.20152015 E-Health andBioengineering Conference (EHB), pp.14Search in Google Scholar
Goel, N., Raman, B. and Gupta, I. 2014. Chaos based joint compression and encryption framework for end-to-end communication systems. Advances in Multimedia 2014: 1–10.GoelN.RamanB.GuptaI.2014Chaos based joint compression and encryption framework for end-to-end communication systems201411010.1155/2014/910106Search in Google Scholar
Gupta, K. and Silakari, S. 2012. Novel approach for fast compressed hybrid color image cryptosystem. Advances in Engineering Software 49(1): 29–42.GuptaK.SilakariS.2012Novel approach for fast compressed hybrid color image cryptosystem491294210.1016/j.advengsoft.2012.03.001Search in Google Scholar
Hamdi, M., Rhouma, R. and Belghith, S. 2017. A selective compression–encryption of images based on SPIHT coding and Chirikov Standard Map. Signal Processing 131: 514–526.HamdiM.RhoumaR.BelghithS.2017A selective compression–encryption of images based on SPIHT coding and Chirikov Standard Map13151452610.1016/j.sigpro.2016.09.011Search in Google Scholar
Hassan, N.S. and Younis, H.A. 2013. Approach for partial encryption of compressed images. Journal of Babylon University Application Science 21(3): 1–10.HassanN.S.YounisH.A.2013Approach for partial encryption of compressed images213110Search in Google Scholar
Hua, Z. and Zhou, Y. 2017. Design of image cipher using block-based scrambling and image filtering. Information Sciences (NY). 396: 97–113.HuaZ.ZhouY.2017Design of image cipher using block-based scrambling and image filtering3969711310.1016/j.ins.2017.02.036Search in Google Scholar
Huang, R., Rhee, K.H.H. and Uchida, S. 2014. A parallel image encryption method based on compressive sensing. Multimedia Tools and Applications 72(1): 71–93.HuangR.RheeK.H.H.UchidaS.2014A parallel image encryption method based on compressive sensing721719310.1007/s11042-012-1337-0Search in Google Scholar
Jolfaei, A. and Mirghadri, A. 2011. Image encryption using chaos and block cipher. Computer and Information Science 4(1): 172–185.JolfaeiA.MirghadriA.2011Image encryption using chaos and block cipher4117218510.5539/cis.v4n1p172Search in Google Scholar
Karthikeyan, T., Praburaj, B. and Kesavapandian, K. 2014. Embedded zero tree wavelet and orthogonal polynomial based transformation coding. Journal of Theoretical and Applied Information Technology 68(1): 215–223.KarthikeyanT.PraburajB.KesavapandianK.2014Embedded zero tree wavelet and orthogonal polynomial based transformation coding681215223Search in Google Scholar
Koops, B. 1999. The crypto controversy a key conflict in the information society. Kluwer Law International, The Netherlands.KoopsB.1999Kluwer Law InternationalThe NetherlandsSearch in Google Scholar
Kumar, M. and Vaish, A. 2016. Prediction error based compression of color images using WDR coding. AEU—International Journal of Electronics and Communications 70(9): 1164–1171.KumarM.VaishA.2016Prediction error based compression of color images using WDR coding7091164117110.1016/j.aeue.2016.05.014Search in Google Scholar
Kumar, M. and Vaish, A. 2017. An efficient encryption-then-compression technique for encrypted images using SVD. Digital Signal Processing 60: 81–89.KumarM.VaishA.2017An efficient encryption-then-compression technique for encrypted images using SVD60818910.1016/j.dsp.2016.08.011Search in Google Scholar
Li, P. and Lo, K. 2015. Joint image compression and encryption based on alternating transforms with quality control. in 2015 Visual Communications and Image Processing (VCIP), pp. 1-4.LiP.LoK.2015Joint image compression and encryption based on alternating transforms with quality control10.1109/VCIP.2015.7457867Search in Google Scholar
Mahaveerakannan, R. and Dhas, C.S.G. 2016. Customized RSA public key cryptosystem using digital signature of secure data transfer natural number algorithm. International Journal of Circuit Theory and Applications 9(5): 2627–2632.MahaveerakannanR.DhasC.S.G.2016Customized RSA public key cryptosystem using digital signature of secure data transfer natural number algorithm9526272632Search in Google Scholar
Morales-Sandoval, M. and Feregrino-Uribe, C. 2005. A hardware architecture for elliptic curve cryptography and lossless data compression. 15th International Conference on Electronics, Communications and Computers (CONIELECOMP'05), pp. 113–118.Morales-SandovalM.Feregrino-UribeC.200515th International Conference on Electronics, Communications and Computers (CONIELECOMP'05), pp.113118Search in Google Scholar
Munir, R. 2012. Security analysis of selective image encryption algorithm based on chaos and CBC-like mode. 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), no. 2, pp. 142–146.MunirR.20122012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), no. 2142146Search in Google Scholar
Murillo-Escobar, M.A., Cruz-Hernandez, C., Abundiz-Perez, F., Lopez-Gutierrez, R.M. and Acosta Del Campo, O.R. 2015. A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Processing 109: 119–131.Murillo-EscobarM.A.Cruz-HernandezC.Abundiz-PerezF.Lopez-GutierrezR.M.Acosta Del CampoO.R.2015A RGB image encryption algorithm based on total plain image characteristics and chaos10911913110.1016/j.sigpro.2014.10.033Search in Google Scholar
Patrick, T.K. 2011. One way functions and public key cryptography. African Journal of Mathematics and Computer Science Research 4(6): 213–216.PatrickT.K.2011One way functions and public key cryptography46213216Search in Google Scholar
Rahmawati, W.M., Saikhu, A. and Kompresi, A.E. 2013. Implementasi Algoritma Penggabungan Kompresi dan Enkripsi Citra dengan DCT dan SHA-1. J. Tek. POMITS 2(1): 1–4.RahmawatiW.M.SaikhuA.KompresiA.E.2013Implementasi Algoritma Penggabungan Kompresi dan Enkripsi Citra dengan DCT dan SHA-12114Search in Google Scholar
Santhosh, M., Charles, B.S. and Giriprasad, M.N. 2013. Lossless image compression using new biorthogonal wavelets. Signal and Image Processing: An International Journal 4(6): 4553.SanthoshM.CharlesB.S.GiriprasadM.N.2013Lossless image compression using new biorthogonal wavelets464553Search in Google Scholar
Santoso, A.J., Nugroho, L.E., Suparta, G.B. and Hidayat, R. 2011. Color image compression using orthogonal wavelet viewed from decomposition level and peak signal to noise ratio. International Journal of Advanced Science and Technology 31: 81–92.SantosoA.J.NugrohoL.E.SupartaG.B.HidayatR.2011Color image compression using orthogonal wavelet viewed from decomposition level and peak signal to noise ratio318192Search in Google Scholar
Setyaningsih, E. and Harjoko, A. 2017. Survey of hybrid image compression techniques. International Journal of Electrical and Computer Engineering 7(4): 2206–2214.SetyaningsihE.HarjokoA.2017Survey of hybrid image compression techniques742206221410.11591/ijece.v7i4.pp2206-2214Search in Google Scholar
Setyaningsih, E. and Wardoyo, R. 2017. Review of image compression and encryption techniques. International Journal of Advanced Computer Science and Applications 8(2): 83–94.SetyaningsihE.WardoyoR.2017Review of image compression and encryption techniques82839410.14569/IJACSA.2017.080212Search in Google Scholar
Sharadha, R. and Bhanuprakash, C. 2013. Image compression technique for color images using wavelets. International Journal of Advanced. Research in Computer Science and Software Engineering 3(11): 322327.SharadhaR.BhanuprakashC.2013Image compression technique for color images using wavelets311322327Search in Google Scholar
Sharma, S. 2012. Modified RSA public key cryptosystem using short range natural number algorithm. International Journal of Advanced. Research in Computer Science and Software Engineering 2(8): 134138.SharmaS.2012Modified RSA public key cryptosystem using short range natural number algorithm28134138Search in Google Scholar
Somani, N. and Mangal, D. 2014. An improved RSA cryptographic system. International Journal of Computer Application 105(16): 18–22.SomaniN.MangalD.2014An improved RSA cryptographic system105161822Search in Google Scholar
Teng, L., Wang, X. and Meng, J. 2017. A Chaotic color image encryption using integrated bit-level permutation. Multimedia Tools and Applications, pp. 1–14.TengL.WangX.MengJ.2017A Chaotic color image encryption using integrated bit-level permutation11410.1007/s11042-017-4605-1Search in Google Scholar
Tong, X.-J., Chen, P. and Zhang, M. 2017. A joint image lossless compression and encryption method based on chaotic map. Multimedia Tools and Applications 76(12): 13995–14020.TongX.-J.ChenP.ZhangM.2017A joint image lossless compression and encryption method based on chaotic map7612139951402010.1007/s11042-016-3775-6Search in Google Scholar
Tong, X.-J., Wang, Z., Zhang, M. and Liu, Y. 2013. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dynamics 72(1-2): 229–241.TongX.-J.WangZ.ZhangM.LiuY.2013A new algorithm of the combination of image compression and encryption technology based on cross chaotic map721-222924110.1007/s11071-012-0707-5Search in Google Scholar
Vaish, A., Gautam, S. and Kumar, M. 2017. A wavelet based approach for simultaneous compression and encryption of fused images. Journal of King Saud Univ.—Computer and Information Science, pp. 1–10.VaishA.GautamS.KumarM.2017A wavelet based approach for simultaneous compression and encryption of fused images11010.1016/j.jksuci.2017.01.005Search in Google Scholar
Wang, B. and Gao, Y. 2015. An image compression scheme based on fuzzy neural network. TELKOMMNIKA (Telecommunication Computing Electronics and Control) 13(1): 137.WangB.GaoY.2015An image compression scheme based on fuzzy neural network13113710.12928/telkomnika.v13i1.1270Search in Google Scholar
Wang, C., Ni, J. and Huang, Q. 2015. A new encryption then compression algorithm using the rate distortion optimization. Signal Processing: Image Communication 39: 141–150.WangC.NiJ.HuangQ.2015A new encryption then compression algorithm using the rate distortion optimization3914115010.1016/j.image.2015.09.009Search in Google Scholar
Wang, X. and Zhao, J. 2010. An improved key agreement protocol based on chaos. Communications in Nonlinear Science and Numerical Simulation 15(12): 4052–4057.WangX.ZhaoJ.2010An improved key agreement protocol based on chaos15124052405710.1016/j.cnsns.2010.02.014Search in Google Scholar
Wang, X., Liu, L. and Zhang, Y. 2015. A novel chaotic block image encryption algorithm based on dynamic random growth technique. Optics and Lasers in Engineering 66: 10–18.WangX.LiuL.ZhangY.2015A novel chaotic block image encryption algorithm based on dynamic random growth technique66101810.1016/j.optlaseng.2014.08.005Search in Google Scholar
Xiang, T., Qu, J. and Xiao, D. 2014. Joint SPIHT compression and selective encryption. Applied Soft Computing 21: 159–170.XiangT.QuJ.XiaoD.2014Joint SPIHT compression and selective encryption2115917010.1016/j.asoc.2014.03.009Search in Google Scholar
Xiaoyong, J., Sen, B., Guibin, Z. and Bing, Y. 2017. Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps. Multimedia Tools and Applications 76(10): 12965–12979.XiaoyongJ.SenB.GuibinZ.BingY.2017Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps7610129651297910.1007/s11042-016-3684-8Search in Google Scholar
Younes, M.A.B. and Jantan, A. 2008. Image encryption using block-based transformation algorithm. International Journal of Computer Science 35(1): 1–9.YounesM.A.B.JantanA.2008Image encryption using block-based transformation algorithm35119Search in Google Scholar
Zhang, M. and Tong, X. 2017. Joint image encryption and compression scheme based on IWT and SPIHT. Optics and Lasers in Engineering. 90: 254–274.ZhangM.TongX.2017Joint image encryption and compression scheme based on IWT and SPIHT9025427410.1016/j.optlaseng.2016.10.025Search in Google Scholar
Zhang, Y., Xu, B. and Zhou, N. 2017. A novel image compression–encryption hybrid algorithm based on the analysis sparse representation. Optics Communications 392: 223–233.ZhangY.XuB.ZhouN.2017A novel image compression–encryption hybrid algorithm based on the analysis sparse representation39222323310.1016/j.optcom.2017.01.061Search in Google Scholar
Zhou, N., Zhang, A., Zheng, F. and Gong, L. 2014. Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Optics and Laser Technology 62: 152–160.ZhouN.ZhangA.ZhengF.GongL.2014Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing6215216010.1016/j.optlastec.2014.02.015Search in Google Scholar
Zhu, Z., Zhang, W., Wong, K. and Yu, H. 2011. A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences (NY). 181(6): 1171–1186.ZhuZ.ZhangW.WongK.YuH.2011A chaos-based symmetric image encryption scheme using a bit-level permutation18161171118610.1016/j.ins.2010.11.009Search in Google Scholar