User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
  Citation Number 2
 Views 10
 Downloands 1
A new and secure digital image scrambling algorithm based on 2D cellular automata
2017
Journal:  
Turkish Journal of Electrical Engineering and Computer Science
Author:  
Abstract:

In this work, a new and secure digital image scrambling algorithm for grayscale images is presented. The main goal of this algorithm is to change and reorder the positions of the pixel values of the grayscale images according to the rules of Conway's Game of Life. For this purpose, an image scrambling matrix is proposed. The proposed algorithm is mostly applied to known benchmark images of various sizes and histograms. Moreover, the proposed algorithm is applied to noisy and low-contrast images to evaluate the performance of the algorithm in consumer applications. The scrambling performance of the algorithm is examined through the evaluation of the correlation values between adjacent pixels in horizontal, vertical, and diagonal directions and the gray difference degree between a pixel value and its neighbor pixel values of the plain and scrambled images. Furthermore, the performance of our algorithm is compared to various state-of-the-art methods. Additionally, in order to measure the reliability of the algorithm, we perform attack analyses such as damage and occlusion. Results show that the proposed algorithm is robust and ensures high security with a powerful scrambling performance. Finally, the proposed algorithm can be used in applications providing security of information, such as image encryption and watermarking.

Keywords:

Citation Owners
Attention!
To view citations of publications, you must access Sobiad from a Member University Network. You can contact the Library and Documentation Department for our institution to become a member of Sobiad.
Off-Campus Access
If you are affiliated with a Sobiad Subscriber organization, you can use Login Panel for external access. You can easily sign up and log in with your corporate e-mail address.
Similar Articles










Turkish Journal of Electrical Engineering and Computer Science

Field :   Mühendislik

Journal Type :   Uluslararası

Metrics
Article : 2.879
Cite : 1.395
Turkish Journal of Electrical Engineering and Computer Science