Image Encryption and Decryption Schemes Using Linear and Quadratic Fractal Algorithms and Their Systems
暂无分享,去创建一个
Anatoliy Kovalchuk | Natalia Lotoshynska | Ivan Izonin | Christine Strauss | Nataliya Kustra | Mariia Podavalkina | I. Izonin | A. Kovalchuk | Mariia Podavalkina | N. Lotoshynska | Christine Strauss | N. Kustra
[1] Iryna Yurchak,et al. Composing method of anti-interference codes based on non-equidistant structures , 2017, 2017 XIIIth International Conference on Perspective Technologies and Methods in MEMS Design (MEMSTECH).
[2] Anatoliy Kovalchuk,et al. Elements of RSA Algorithm and Extra Noising in a Binary Linear-Quadratic Transformations During Encryption and Decryption of Images , 2018, 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP).
[3] Anatoliy Kovalchuk,et al. An Efficient Image Encryption Scheme using Projective Transformations , 2019, EUSPN/ICTH.
[4] D. D. Peleshko,et al. The use of disjunctive covering of images to increase strength of the RSA algorithm , 2011, Perspective Technologies and Methods in MEMS Design.
[5] Mohamad Rushdan Md. Said,et al. Efficiency Analysis for Public Key Systems Based on Fractal Functions , 2011 .
[6] Natalia Kryvinska,et al. "Memoxo" - Browser-Based Prototype for the Audio/Video Messages Recording , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[7] Mariya Nazarkevych,et al. Methods of protection document formed from latent element located by fractals , 2015, 2015 Xth International Scientific and Technical Conference "Computer Sciences and Information Technologies" (CSIT).
[8] Natalia Kryvinska,et al. Enterprise network maintaining mobility - architectural model of services delivery , 2011, Int. J. Pervasive Comput. Commun..
[9] Elmo Benedetto,et al. An Information Fusion approach based on prime numbers coming from RSA algorithm and Fractals for secure coding , 2015 .
[10] Oleg Riznyk,et al. A synthesis of barker sequences is by means of numerical bundles , 2017, 2017 14th International Conference The Experience of Designing and Application of CAD Systems in Microelectronics (CADSM).
[11] Octavio José Salcedo Parra,et al. Encryption through the use of fractals , 2017 .
[13] Riznyk Oleg,et al. Information technologies of optimization of structures of the systems are on the basis of combinatorics methods , 2017, 2017 12th International Scientific and Technical Conference on Computer Sciences and Information Technologies (CSIT).
[14] Mariya Nazarkevych,et al. Detection of regularities in the parameters of the atebgabor method for biometric image filtration , 2019, Eastern-European Journal of Enterprise Technologies.
[15] Mariya Nazarkevych,et al. Complexity Evaluation of the Ateb-Gabor Filtration Algorithm in Biometric Security Systems , 2019, 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON).
[16] Shafali Agarwal,et al. Image Encryption Techniques Using Fractal Function:A Review , 2017 .
[17] Jitendra Malik,et al. Contour detection and image segmentation , 2009 .