A Hybrid Cryptographic Encryption Technique for Securing Surveillance Digital Images in Mobile Urban Situation Awareness Systems
暂无分享,去创建一个
Laurent Nana | Quist-Aphetsi Kester | Nii Narku Quaynor | Anca Christine Pascu | Sophie Gire | Jojo M. Eghan
[1] Robert E. Balfour,et al. The what, why and how of achieving urban telepresence , 2013, 2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[2] S. Roy,et al. Robust video watermarking scheme based on visual cryptography , 2012, 2012 World Congress on Information and Communication Technologies.
[3] S. P. Bansod,et al. Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).
[4] G. Prema,et al. An enhanced security algorithm for wireless application using RSA and genetic approach , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] Dongming Chen. A Feasible Chaotic Encryption Scheme for Image , 2009, 2009 International Workshop on Chaos-Fractals Theories and Applications.
[7] Avi Wigderson,et al. Public-key cryptography from different assumptions , 2010, STOC '10.
[8] David A. Cooper,et al. Quantum resistant public key cryptography: a survey , 2009, IDtrust '09.
[9] Zhi-bin Li,et al. Color Image Cryptography Using Multiple One-Dimensional Chaotic Maps and OCML , 2009, 2009 International Symposium on Information Engineering and Electronic Commerce.
[10] Sajal K. Das,et al. Handbook on Securing Cyber-Physical Critical Infrastructure , 2012 .
[11] Aiden A. Bruen,et al. Cryptography, information theory, and error-correction - a handbook for the 21st century , 2005, Wiley-Interscience series in discrete mathematics and optimization.
[12] Musheer Ahmad,et al. Securing multimedia colour imagery using multiple high dimensional chaos-based hybrid keys , 2014, Int. J. Commun. Networks Distributed Syst..
[13] Oscar C. Au,et al. Joint visual cryptography and watermarking , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[14] Jari Saarinen,et al. Localization Services for Online Common Operational Picture and Situation Awareness , 2013, IEEE Access.
[15] Laurent Nana,et al. A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement , 2014, SNDS.
[16] Q. Saeed,et al. Mathematical Hard Problems in Modern Public-Key Cryptosystem , 2006, 2006 International Conference on Emerging Technologies.
[17] ShunDa Lin. Image transmission and cryptography on the basis of Mobius transform , 2012, 2012 5th International Congress on Image and Signal Processing.
[18] Jonathan Bishop,et al. Representations of 'trolls' in mass media communication: a review of media-texts and moral panics relating to 'internet trolling' , 2014, Int. J. Web Based Communities.
[19] K. M. Koumadi,et al. Cryptographie technique for image encryption based on the RGB pixel displacement , 2012, 2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST).
[20] Feng-Hao Liu,et al. Public-Key Cryptography from New Multivariate Quadratic Assumptions , 2012, Public Key Cryptography.