X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (9862) 9862
Conference Proceeding (3319) 3319
Patent (1527) 1527
Book / eBook (760) 760
Book Chapter (751) 751
Publication (407) 407
Newspaper Article (319) 319
Magazine Article (133) 133
Newsletter (124) 124
Dissertation (97) 97
Web Resource (43) 43
Trade Publication Article (37) 37
Paper (31) 31
Transcript (18) 18
Book Review (13) 13
Government Document (9) 9
Reference (5) 5
Data Set (1) 1
Report (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
encryption (4783) 4783
algorithms (3279) 3279
images (3276) 3276
image encryption (2831) 2831
cryptography (2638) 2638
computer science (2573) 2573
engineering (2450) 2450
engineering, electrical & electronic (1990) 1990
computer communication networks (1913) 1913
image processing (1901) 1901
physics (1777) 1777
security (1702) 1702
counting (1538) 1538
computing (1530) 1530
image data processing or generation, in general (1528) 1528
calculating (1527) 1527
analysis (1520) 1520
computer science, information systems (1518) 1518
communications engineering, networks (1517) 1517
telecommunications (1515) 1515
data encryption (1514) 1514
signal, image and speech processing (1367) 1367
optics (1290) 1290
watermarking (1244) 1244
computer simulation (1200) 1200
verschlüsselung (1069) 1069
computer science, theory & methods (1045) 1045
chaos theory (1003) 1003
multimedia information systems (977) 977
image coding (962) 962
chaos (899) 899
computer security (875) 875
computer science, software engineering (863) 863
algorithm (856) 856
methods (853) 853
computer graphics (850) 850
electricity (816) 816
electric communication technique (806) 806
artificial intelligence (787) 787
steganography (782) 782
scheme (773) 773
authentication (766) 766
image processing and computer vision (743) 743
computer information security (729) 729
data structures, cryptology and information theory (677) 677
pixels (672) 672
image compression (666) 666
electrical engineering (648) 648
signal,image and speech processing (623) 623
multimedia (613) 613
pictorial communication, e.g. television (589) 589
data security (564) 564
special purpose and application-based systems (562) 562
electronics (552) 552
usage (542) 542
telecommunication (535) 535
color (533) 533
electric digital data processing (519) 519
transmission of digital information, e.g. telegraphiccommunication (509) 509
signal processing (508) 508
management (505) 505
system (502) 502
computers (501) 501
diffusion (497) 497
electronic books (492) 492
robustness (486) 486
research (482) 482
internet (470) 470
dynamics (464) 464
mathematical analysis (463) 463
mathematical models (462) 462
cryptanalysis (458) 458
multimedia systems (450) 450
privacy (440) 440
image quality (432) 432
pattern recognition (431) 431
mathematics (430) 430
application software (420) 420
image reconstruction (413) 413
image transmission (406) 406
permutation (395) 395
entropy (385) 385
robotics (383) 383
computer vision (380) 380
cloud computing (375) 375
user interfaces (375) 375
computer science, artificial intelligence (365) 365
logic design (365) 365
histograms (363) 363
image (362) 362
logistics (362) 362
safety and security measures (362) 362
education (361) 361
compression (360) 360
display (358) 358
advertising (345) 345
seals (342) 342
equipment and supplies (336) 336
information security (334) 334
chaotic communication (333) 333
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Engineering & Comp. Sci. - Stacks (67) 67
Online Resources - Online (46) 46
UTL at Downsview - May be requested (40) 40
Collection Dvlpm't (Acquisitions) - Vendor file (30) 30
Gerstein Science - Stacks (15) 15
Collection Dvlpm't (Acquisitions) - Closed Orders (14) 14
UofT at Mississauga - Stacks (13) 13
Robarts - Stacks (10) 10
Faculty of Information - Stacks (8) 8
UofT at Scarborough - Stacks (8) 8
Mathematical Sciences - Stacks (3) 3
Engineering & Comp. Sci. - May be requested in 6-10 wks (2) 2
Royal Ontario Museum - Stacks (2) 2
United Church of Canada Archives - Reference (2) 2
Architecture Landscape (Shore + Moffat) - Stacks (1) 1
Engineering & Comp. Sci. - Material is damaged (1) 1
Engineering & Comp. Sci. - Missing (1) 1
Engineering & Comp. Sci. - Special Collections (1) 1
Faculty of Information - May be requested in 6-10 wks (1) 1
Gerstein Science - Circulation Desk (1) 1
Gerstein Science - Reference (1) 1
Innis College - Stacks (1) 1
Law (Bora Laskin) - Stacks (1) 1
New College (Ivey) - Stacks (1) 1
OISE - Stacks (1) 1
Physics - Stacks (1) 1
Physics - Storage (1) 1
Pontifical Inst. Mediaeval Studies - Library use only (1) 1
Victoria University E.J. Pratt - Internal dept (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (15460) 15460
Chinese (1103) 1103
French (225) 225
German (142) 142
Japanese (77) 77
Korean (54) 54
Spanish (26) 26
Turkish (7) 7
Russian (5) 5
Portuguese (4) 4
Arabic (3) 3
Indonesian (3) 3
Norwegian (3) 3
Czech (2) 2
Dutch (2) 2
Swedish (2) 2
Croatian (1) 1
Hungarian (1) 1
Icelandic (1) 1
Latin (1) 1
Polish (1) 1
Romanian (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Image Processing, ISSN 1057-7149, 12/2017, Volume 26, Issue 12, pp. 5618 - 5631
Journal Article
Optics Letters, ISSN 0146-9592, 08/2018, Volume 43, Issue 15, pp. 3558 - 3561
We propose for the first time, to the best of our knowledge, the use of optimized random phases (ORAPs) in a double random phase encryption scheme (DRPE). In... 
VULNERABILITY | ATTACK | IMAGE | OPTICS | OPTICAL ENCRYPTION | PLANE
Journal Article
Optics and Laser Technology, ISSN 0030-3992, 08/2016, Volume 82, pp. 121 - 133
Most image encryption algorithms based on low-dimensional chaos systems bear security risks and suffer encryption data expansion when adopting nonlinear... 
Hyper-chaotic system | Compressive sensing | Image compression–encryption | Image compression-encryption | PHYSICS, APPLIED | ALGORITHM | INTERFERENCE | CRYPTANALYSIS | OPTICS | MAP | Electrical engineering | Data encryption chips | Algorithms | Data compression | Images | Risk | Nonlinearity | Encryption | Security | Two dimensional | Detection
Journal Article
Signal Processing, ISSN 0165-1684, 07/2014, Volume 100, pp. 197 - 207
To enhance security of the bitplane decomposition based image encryption methods, this paper introduces a novel image encryption algorithm using a bitplane of... 
Image encryption | Bitplane decomposition | Bit-level permutation | Security analysis | TRANSFORM | FIBONACCI P-CODES | ENGINEERING, ELECTRICAL & ELECTRONIC | Investment analysis | Analysis | Algorithms | Permutations | Images | Decomposition | Encryption | Security | Flexibility | Image enhancement
Journal Article
Physics Letters A, ISSN 0375-9601, 2005, Volume 346, Issue 1, pp. 153 - 157
In this Letter, a new image encryption scheme is presented, in which shuffling the positions and changing the grey values of image pixels are combined to... 
Chaos | Image encryption | Arnold map | Chen's chaotic system | chaos | MAPS | PHYSICS, MULTIDISCIPLINARY | SCAN PATTERNS | image encryption | Algorithms
Journal Article
Information Sciences, ISSN 0020-0255, 07/2014, Volume 273, pp. 329 - 351
We propose a new image encryption algorithm based on the spatiotemporal chaos of the mixed linear–nonlinear coupled map lattices. This spatiotemporal chaotic... 
Image encryption | Bit-level permutation | Spatiotemporal chaos | Coupled map lattices | CHAOS | COMPUTER SCIENCE, INFORMATION SYSTEMS | ENTROPY | Algorithms
Journal Article
Pattern Recognition, ISSN 0031-3203, 2007, Volume 40, Issue 3, pp. 1014 - 1031
A random grid in this paper is a transparency comprising a two-dimensional array of pixels that are either transparent or opaque determined in a totally random... 
Image encryption | Visual cryptography | Random grid | Halftone | Color mixing | Color decomposition | halftone | color mixing | random grid | COLOR IMAGES | image encryption | color decomposition | visual cryptography | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | ENGINEERING, ELECTRICAL & ELECTRONIC | Cryptography | Algorithms
Journal Article
IEEE Transactions on Circuits and Systems for Video Technology, ISSN 1051-8215, 04/2017, Volume 27, Issue 4, pp. 892 - 906
Journal Article
Information Sciences, ISSN 0020-0255, 03/2015, Volume 297, pp. 80 - 94
Because of the excellent properties of unpredictability, ergodicity and sensitivity to their parameters and initial values, chaotic maps are widely used in... 
Image encryption | 2D Sine Logistic modulation map | Chaotic magic transform | KOLMOGOROV-ENTROPY | LYAPUNOV EXPONENTS | CHAOTIC SYSTEM | COMPUTER SCIENCE, INFORMATION SYSTEMS | TRANSFORM | CRYPTANALYSIS | Analysis | Algorithms | Chaos theory | Modulation | Images | Encryption | Security | Two dimensional | Logistics
Journal Article
Signal Processing, ISSN 0165-1684, 06/2018, Volume 147, pp. 133 - 145
•We propose two integrated chaotic systems (ICS) to generate different chaotic maps.•A new image encryption algorithm is developed using ICS.•We provide a... 
Image encryption | Integrated chaotic systems | Chaotic maps | RANDOMNESS | SEQUENCES | ALGORITHM | DECOMPOSITION | ENGINEERING, ELECTRICAL & ELECTRONIC | SCHEME | CIPHER | TRANSFORM | CRYPTANALYSIS | MAP
Journal Article
Information Sciences, ISSN 0020-0255, 08/2016, Volume 355-356, pp. 314 - 327
Journal Article
Signal Processing, ISSN 0165-1684, 04/2014, Volume 97, pp. 172 - 182
This paper introduces a simple and effective chaotic system using a combination of two existing one-dimension (1D) chaotic maps (seed maps). Simulations and... 
Image encryption | Chaotic system | Security analysis | Chosen-plaintext attack | NETWORK | ALGORITHM | DECOMPOSITION | ENGINEERING, ELECTRICAL & ELECTRONIC | SCHEME | SYNCHRONIZATION | MAPS | CRYPTANALYSIS | RANDOM GRIDS | Investment analysis | Analysis | Algorithms | Multimedia | Seeds | Maps | Chaos theory | Images | Encryption | Security
Journal Article
Optics Communications, ISSN 0030-4018, 06/2017, Volume 392, pp. 223 - 233
Recent advances on the compressive sensing theory were invoked for image compression–encryption based on the synthesis sparse model. In this paper we... 
Image encryption | Compressive sensing | Image compression | Analysis sparse representation | OPTICS | Data compression | Analysis | Algorithms
Journal Article
Information Sciences, ISSN 0020-0255, 04/2016, Volume 339, pp. 237 - 253
With complex properties of ergodicity, unpredictability and sensitivity to initial states, chaotic systems are widely used in cryptography. This paper proposes... 
Image encryption | Chaotic map | Chaotic encryption | Confusion and diffusion | KOLMOGOROV-ENTROPY | SCHEME | BREAKING | CHAOTIC SYSTEM | CIPHERS | ALGORITHM | COMPUTER SCIENCE, INFORMATION SYSTEMS | CRYPTANALYSIS | Investment analysis | Analysis | Chaos theory | Images | Encryption | Confusion | Security | Two dimensional | Cryptography | Ergodic processes
Journal Article
Nonlinear Dynamics, ISSN 0924-090X, 1/2012, Volume 67, Issue 1, pp. 557 - 566
Journal Article