References
- Abd El-Latif, A.A. and Niu, X. 2013. A hybrid chaotic system and cyclic elliptic curve for image encryption. AEU—International Journal of Electronics and Communications 67(2).
- Ahmad, J., Khan, M.A., Hwang, S.O. and Khan, J.S. 2017. A compression sensing and noise-tolerant image encryption scheme based on chaotic maps and orthogonal matrices. Neural Computing and Applications 28(S1): 953–967.
- Alleaume, R., Branciard, C., Bouda, J., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Langer, T., Lutkenhaus, N., Monyk, C., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H. and Zeilinger, A. 2014. Using quantum key distribution for cryptographic purposes: a survey. Theoretical Computer Science 560: 62–81.
- Al-Maadeed, S., Al-Ali, A. and Abdalla, T. 2012. A new chaos-based image-encryption and compression algorithm. Journal of Electrical and Computer Engineering 2012: 1–11.
- Ayele, A.A. and Screenivasarao, V. 2013. A modified RSA encryption technique based on multiple public keys. International Journal of Innovative Research in Computer and Communication Engineering 1(4): 859–864.
- Belazi, A., Abd El-Latif, A.A., Diaconu, A.-V., Rhouma, R. and Belghith, S. 2017. Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms. Optics and Lasers in Engineering 88: 37–50.
- Boriga, R., Dascalescu, A.C. and Priescu, I. 2014. A new hyperchaotic map and its application in an image encryption scheme. Signal Processing: Image Communication 29(8): 887–901.
- Bull, D.R. 2014. Communicating pictures: a course in image and video coding. Academic Press, New York.
- Chen, J., Zhou, J. and Wong, K.-W. 2011. A modified chaos-based joint compression and encryption scheme. IEEE Transactions on Circuits and Systems II Express Briefs 58(2): 110–114.
- Chen, T., Zhang, M., Wu, J., Yuen, C. and Tong, Y. 2016. Image encryption and compression based on kronecker compressed sensing and elementary cellular automata scrambling. Optics & Laser Technology 84: 118–133.
- Chen, W., Wang, T. and Wang, B. 2014. Design of digital image encryption algorithm based on mixed chaotic sequences. International Journal on Smart Sensing and Intelligent Systems 7(4): pp. 1453–1469.
- Deng, J., Zhao, S., Wang, Y., Wang, L., Wang, H. and Sha, H. 2017. Image compression–encryption scheme combining 2D compressive sensing with discrete fractional random transform. Multimedia Tools and Applications 76(7): 10097–10117.
- Dhenakaran, S.S. and Ilayaraja, M. 2012. Extension of playfair cipher using 16X16 matrix. International Journal of Computer Application 48(7): 37–41.
- Fira, M. 2015. Applications of compressed sensing: compression and encryption. 2015 E-Health andBioengineering Conference (EHB), pp. 1–4.
- Goel, N., Raman, B. and Gupta, I. 2014. Chaos based joint compression and encryption framework for end-to-end communication systems. Advances in Multimedia 2014: 1–10.
- Gupta, K. and Silakari, S. 2012. Novel approach for fast compressed hybrid color image cryptosystem. Advances in Engineering Software 49(1): 29–42.
- Hamdi, M., Rhouma, R. and Belghith, S. 2017. A selective compression–encryption of images based on SPIHT coding and Chirikov Standard Map. Signal Processing 131: 514–526.
- Hassan, N.S. and Younis, H.A. 2013. Approach for partial encryption of compressed images. Journal of Babylon University Application Science 21(3): 1–10.
- Hua, Z. and Zhou, Y. 2017. Design of image cipher using block-based scrambling and image filtering. Information Sciences (NY). 396: 97–113.
- Huang, R., Rhee, K.H.H. and Uchida, S. 2014. A parallel image encryption method based on compressive sensing. Multimedia Tools and Applications 72(1): 71–93.
- Jolfaei, A. and Mirghadri, A. 2011. Image encryption using chaos and block cipher. Computer and Information Science 4(1): 172–185.
- Karthikeyan, T., Praburaj, B. and Kesavapandian, K. 2014. Embedded zero tree wavelet and orthogonal polynomial based transformation coding. Journal of Theoretical and Applied Information Technology 68(1): 215–223.
- Koops, B. 1999. The crypto controversy a key conflict in the information society. Kluwer Law International, The Netherlands.
- Kumar, M. and Vaish, A. 2016. Prediction error based compression of color images using WDR coding. AEU—International Journal of Electronics and Communications 70(9): 1164–1171.
- Kumar, M. and Vaish, A. 2017. An efficient encryption-then-compression technique for encrypted images using SVD. Digital Signal Processing 60: 81–89.
- Li, P. and Lo, K. 2015. Joint image compression and encryption based on alternating transforms with quality control. in 2015 Visual Communications and Image Processing (VCIP), pp. 1-4.
- Mahaveerakannan, R. and Dhas, C.S.G. 2016. Customized RSA public key cryptosystem using digital signature of secure data transfer natural number algorithm. International Journal of Circuit Theory and Applications 9(5): 2627–2632.
- Morales-Sandoval, M. and Feregrino-Uribe, C. 2005. A hardware architecture for elliptic curve cryptography and lossless data compression. 15th International Conference on Electronics, Communications and Computers (CONIELECOMP'05), pp. 113–118.
- Munir, R. 2012. Security analysis of selective image encryption algorithm based on chaos and CBC-like mode. 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), no. 2, pp. 142–146.
- Murillo-Escobar, M.A., Cruz-Hernandez, C., Abundiz-Perez, F., Lopez-Gutierrez, R.M. and Acosta Del Campo, O.R. 2015. A RGB image encryption algorithm based on total plain image characteristics and chaos. Signal Processing 109: 119–131.
- Patrick, T.K. 2011. One way functions and public key cryptography. African Journal of Mathematics and Computer Science Research 4(6): 213–216.
- Rahmawati, W.M., Saikhu, A. and Kompresi, A.E. 2013. Implementasi Algoritma Penggabungan Kompresi dan Enkripsi Citra dengan DCT dan SHA-1. J. Tek. POMITS 2(1): 1–4.
- Santhosh, M., Charles, B.S. and Giriprasad, M.N. 2013. Lossless image compression using new biorthogonal wavelets. Signal and Image Processing: An International Journal 4(6): 4553.
- Santoso, A.J., Nugroho, L.E., Suparta, G.B. and Hidayat, R. 2011. Color image compression using orthogonal wavelet viewed from decomposition level and peak signal to noise ratio. International Journal of Advanced Science and Technology 31: 81–92.
- Setyaningsih, E. and Harjoko, A. 2017. Survey of hybrid image compression techniques. International Journal of Electrical and Computer Engineering 7(4): 2206–2214.
- Setyaningsih, E. and Wardoyo, R. 2017. Review of image compression and encryption techniques. International Journal of Advanced Computer Science and Applications 8(2): 83–94.
- Sharadha, R. and Bhanuprakash, C. 2013. Image compression technique for color images using wavelets. International Journal of Advanced. Research in Computer Science and Software Engineering 3(11): 322327.
- Sharma, S. 2012. Modified RSA public key cryptosystem using short range natural number algorithm. International Journal of Advanced. Research in Computer Science and Software Engineering 2(8): 134138.
- Somani, N. and Mangal, D. 2014. An improved RSA cryptographic system. International Journal of Computer Application 105(16): 18–22.
- Teng, L., Wang, X. and Meng, J. 2017. A Chaotic color image encryption using integrated bit-level permutation. Multimedia Tools and Applications, pp. 1–14.
- Tong, X.-J., Chen, P. and Zhang, M. 2017. A joint image lossless compression and encryption method based on chaotic map. Multimedia Tools and Applications 76(12): 13995–14020.
- Tong, X.-J., Wang, Z., Zhang, M. and Liu, Y. 2013. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dynamics 72(1-2): 229–241.
- Vaish, A., Gautam, S. and Kumar, M. 2017. A wavelet based approach for simultaneous compression and encryption of fused images. Journal of King Saud Univ.—Computer and Information Science, pp. 1–10.
- Wang, B. and Gao, Y. 2015. An image compression scheme based on fuzzy neural network. TELKOMMNIKA (Telecommunication Computing Electronics and Control) 13(1): 137.
- Wang, C., Ni, J. and Huang, Q. 2015. A new encryption then compression algorithm using the rate distortion optimization. Signal Processing: Image Communication 39: 141–150.
- Wang, X. and Zhao, J. 2010. An improved key agreement protocol based on chaos. Communications in Nonlinear Science and Numerical Simulation 15(12): 4052–4057.
- Wang, X., Liu, L. and Zhang, Y. 2015. A novel chaotic block image encryption algorithm based on dynamic random growth technique. Optics and Lasers in Engineering 66: 10–18.
- Xiang, T., Qu, J. and Xiao, D. 2014. Joint SPIHT compression and selective encryption. Applied Soft Computing 21: 159–170.
- Xiaoyong, J., Sen, B., Guibin, Z. and Bing, Y. 2017. Image encryption and compression based on the generalized knight’s tour, discrete cosine transform and chaotic maps. Multimedia Tools and Applications 76(10): 12965–12979.
- Younes, M.A.B. and Jantan, A. 2008. Image encryption using block-based transformation algorithm. International Journal of Computer Science 35(1): 1–9.
- Zhang, M. and Tong, X. 2017. Joint image encryption and compression scheme based on IWT and SPIHT. Optics and Lasers in Engineering. 90: 254–274.
- Zhang, Y., Xu, B. and Zhou, N. 2017. A novel image compression–encryption hybrid algorithm based on the analysis sparse representation. Optics Communications 392: 223–233.
- Zhou, N., Zhang, A., Zheng, F. and Gong, L. 2014. Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing. Optics and Laser Technology 62: 152–160.
- Zhu, Z., Zhang, W., Wong, K. and Yu, H. 2011. A chaos-based symmetric image encryption scheme using a bit-level permutation. Information Sciences (NY). 181(6): 1171–1186.