Reply to comment on "A technique for image encryption using digital signature"

被引:1
|
作者
Sinha, A. [1 ]
Singh, Kehar [1 ]
机构
[1] Indian Inst Technol, Dept Phys, Photon Grp, New Delhi 110016, India
关键词
D O I
10.1016/j.optcom.2006.07.044
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
引用
收藏
页码:266 / 268
页数:3
相关论文
共 50 条
  • [31] Digital Image Encryption using Improved Chaotic Map Lattice
    Chapaneri, Radhika
    Sarode, Tanuja
    Chapaneri, Santosh
    2013 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2013,
  • [32] Retraction Note: Encryption scheme with mixed homomorphic signature based on message authentication for digital image
    Jing Yang
    Mingyu Fan
    Guangwei Wang
    The Journal of Supercomputing, 2024, 80 : 10192 - 10192
  • [33] A novel method of digital image encryption using graph theory
    Anand B. Joshi
    Dhanesh Kumar
    Sachin Kumar
    Sonali Singh
    Multimedia Tools and Applications, 2024, 83 : 6803 - 6828
  • [34] Image/video encryption using single shot digital holography
    Li, Xiaoyu
    Tang, Chen
    Zhu, Xinjun
    Li, Biyuan
    Wang, Linlin
    Yan, Xiusheng
    OPTICS COMMUNICATIONS, 2015, 342 : 218 - 223
  • [35] A simple image encryption scheme using digital watermarking technology
    Duan, Wenxiu
    International Review on Computers and Software, 2011, 6 (07) : 1325 - 1328
  • [36] RETRACTED ARTICLE: Encryption scheme with mixed homomorphic signature based on message authentication for digital image
    Jing Yang
    Mingyu Fan
    Guangwei Wang
    The Journal of Supercomputing, 2020, 76 : 1201 - 1211
  • [37] Image Scrambling Methods For Digital Image Encryption
    Shelke, Raviraj
    Metkar, Shilpa
    2016 INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (ICONSIP), 2016,
  • [38] A robust image encryption technique using dual chaotic map
    Naskar, Prabir Kr
    Chaudhuri, Atal
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (04) : 358 - 380
  • [39] Hybrid Approach for Image Encryption Using Hill Cipher Technique
    Kumar, Sharath H. S.
    Panduranga, H. T.
    Kumar, Naveen S. K.
    WIRELESS NETWORKS AND COMPUTATIONAL INTELLIGENCE, ICIP 2012, 2012, 292 : 200 - 205
  • [40] Text to Image Encryption Technique using RGB Substitution and AES
    Joshy, Amal
    Baby, Amitha K. X.
    Padma, S.
    Fasila, K. A.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 1133 - 1136