Design of a new signal security system

  title={Design of a new signal security system},
  author={Jui-Cheng Yen and Jiun-In Guo},
Abstruct The basic ideas of the signal encryption algorithms can be classified into three major types: position permutation, value transformation and the combinationform. In this paper, a new signal security system and its VLSl architecture are proposed. The encryption algorithm belongs to the combination form. Based on two bitsirculation functions with parameters controlled by a chaotic binary sequence, every eight pixels are value-transformed and then position-permuted in each bit -plane. The… CONTINUE READING
Highly Cited
This paper has 51 citations. REVIEW CITATIONS

From This Paper

Figures, tables, and topics from this paper.


Publications citing this paper.
Showing 1-10 of 23 extracted citations

Periodicity analysis of Arnold Cat Map and its application to image encryption

2017 International Conference on Inventive Computing and Informatics (ICICI) • 2017
View 1 Excerpt

Integrated successive approximation register analog-to-digital converter for healthcare systems applications

2014 12th IEEE International Conference on Solid-State and Integrated Circuit Technology (ICSICT) • 2014
View 1 Excerpt

Time-interleaved pipelined ADC design for computational intelligence and cloud computing application

2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems • 2014
View 1 Excerpt

A novel bit-level image encryption scheme using hyper-chaotic systems

2013 10th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) • 2013
View 2 Excerpts

A two layer chaotic network based image encryption technique


52 Citations

Citations per Year
Semantic Scholar estimates that this publication has 52 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-4 of 4 references

A neural network for signal encryptioddecryption and its VLSI architecture

J. I. Guo

A new multiresolution approach to still image encryption

I. C. Lin
Pattern recognition and Image Analysis • 1999

Similar Papers

Loading similar papers…