RSA scheme with MRF and ECC for data encryption
暂无分享,去创建一个
[1] Klara Nahrstedt,et al. Using Cryptographic and Watermarking Algorithms , 2001, IEEE Multim..
[2] Chaur-Chin Chen. Watermarking experiments based on wavelet transforms , 2002, SPIE/COS Photonics Asia.
[3] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[4] Chun-Shien Lu,et al. A message-based cocktail watermarking system , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[5] Jan C. A. van der Lubbe,et al. Basic Methods of Cryptography , 1998 .
[6] Anil K. Jain,et al. Random field models in image analysis , 1989 .
[7] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[8] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[9] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Chaur-Chin Chen. Data Encryption Using MRF with an RSA Key , 2001, IEEE Pacific Rim Conference on Multimedia.
[12] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.