no code implementations • 21 Oct 2017 • Xintao Duan, Haoxian Song, En Zhang, Jingjing Liu
To protect image contents, most existing encryption algorithms are designed to transform an original image into a texture-like or noise-like image, which is, however, an obvious visual sign indicating the presence of an encrypted image, results in a significantly large number of attacks.