A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure
暂无分享,去创建一个
[1] Ran Tao,et al. Image Encryption With Multiorders of Fractional Fourier Transforms , 2010, IEEE Transactions on Information Forensics and Security.
[2] Amitesh Singh Rajput,et al. A Novel Image Encryption and Authentication Scheme Using Chaotic Maps , 2014, ISI.
[3] Maaruf Ali,et al. Highly secured chaotic block cipher for fast image encryption , 2014, Appl. Soft Comput..
[4] G. Álvarez,et al. Cryptanalysis of a chaotic encryption system , 2000 .
[5] Bin Zhu,et al. A Novel Color Image Encryption Scheme Using Rectangular Transform-Enhanced Chaotic Tent Maps , 2017, IEEE Access.
[6] Paul M. Chau,et al. Image encryption for secure Internet multimedia applications , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).
[7] Miao Zhang,et al. A new chaotic map based image encryption schemes for several image formats , 2014, J. Syst. Softw..
[8] G. Hacibeki̇rog˜lu,et al. The higher order Schwarzian derivative: Its applications for chaotic behavior and new invariant sufficient condition of chaos , 2009 .
[9] Gonzalo Álvarez,et al. Cryptanalysis of a computer cryptography scheme based on a filter bank , 2007, Chaos, Solitons & Fractals.
[10] Xiaonan Luo,et al. Integrated chaotic systems for image encryption , 2018, Signal Process..
[11] Yu-Chen Hu,et al. An adaptive image authentication scheme for vector quantization compressed image , 2011, J. Vis. Commun. Image Represent..
[12] Bin Wang,et al. Cryptanalysis of an image cryptosystem based on logistic map , 2013 .
[13] Mario Aldape-Pérez,et al. Substitution box generation using Chaos: An image encryption application , 2018, Appl. Math. Comput..
[14] Kwok-Wo Wong,et al. A fast image encryption and authentication scheme based on chaotic maps , 2010 .
[15] Sos S. Agaian,et al. Local Shannon entropy measure with statistical tests for image randomness , 2013, Inf. Sci..
[16] Chi-Shiang Chan. An image authentication method by applying Hamming code on rearranged bits , 2011, Pattern Recognit. Lett..
[17] S. Pincus. Approximate entropy (ApEn) as a complexity measure. , 1995, Chaos.
[18] Safya Belghith,et al. Selective image encryption scheme based on DWT, AES S-box and chaotic permutation , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
[19] Kwok-Wo Wong,et al. An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion , 2013, Commun. Nonlinear Sci. Numer. Simul..
[20] Kehui Sun,et al. A fast image encryption algorithm based on chaotic map , 2016 .
[21] Yicong Zhou,et al. Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..
[22] W. Trzciński,et al. Optical spectroscopy to study confined and semi-closed explosions of homogeneous and composite charges , 2017 .
[23] Yannick Abanda,et al. Image encryption by chaos mixing , 2016, IET Image Process..
[24] Guangchun Luo,et al. An image encryption scheme based on chaotic tent map , 2016, Nonlinear Dynamics.
[25] Yu-Chen Hu,et al. A novel reversible image authentication scheme for digital images , 2014, Signal Process..
[26] Wen-Chuan Wu,et al. SVD-based self-embedding image authentication scheme using quick response code features , 2016, J. Vis. Commun. Image Represent..
[27] Qiang Liu,et al. A novel image encryption algorithm based on chaos and Line map , 2015, Neurocomputing.
[28] Lin Yuan,et al. Image authentication based on double-image encryption and partial phase decryption in nonseparable fractional Fourier domain , 2017 .
[29] Ahmed A. Abd El-Latif,et al. A simple yet efficient S-box method based on chaotic sine map , 2017 .
[30] Kehui Sun,et al. A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map , 2018, Signal Process..
[31] Lu Xu,et al. A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion , 2017 .
[32] Safya Belghith,et al. A novel approach to construct S-box based on Rossler system , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
[33] Yicong Zhou,et al. Medical image encryption using edge maps , 2017, Signal Process..
[34] Osama S. Faragallah. Efficient confusion–diffusion chaotic image cryptosystem using enhanced standard map , 2015, Signal Image Video Process..
[35] Diana Maimut,et al. Authenticated Encryption: Toward Next-Generation Algorithms , 2014, IEEE Security & Privacy.