Performance Evaluation of Enhanced RC6 Permutation-Diffusion Operation in Securing Images
暂无分享,去创建一个
[1] Jean-Yves Chouinard,et al. A Secure Image Encryption Algorithm Based on Rubik's Cube Principle , 2012, J. Electr. Comput. Eng..
[2] C. Seldev Christopher,et al. Novel Scheme for Compressed Image Authentication Using LSB Watermarking and EMRC6 Encryption , 2016 .
[3] Lokesh Singh,et al. An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy , 2016 .
[4] Yong Wang,et al. A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..
[5] Mohie M. Hadhoud,et al. Performance Evaluation of Symmetric Encryption Algorithms , 2008 .
[6] Fathi E. Abd El-Samie,et al. 3-D Image Encryption Based on Rubik’s Cube and RC6 Algorithm , 2017 .
[7] S. El-Rabaie,et al. A New Method for Encrypting Images with Few Details Using Rijndael and RC6 Block Ciphers in the Electronic Code Book Mode , 2012, Inf. Secur. J. A Glob. Perspect..
[8] Archana M. Nayak,et al. A Literature Survey on Image Encryption , 2016 .
[9] Vikas Tyagi,et al. ENHANCEMENT OF RC6 (RC6_EN) BLOCK CIPHER ALGORITHM AND COMPARISON WITH RC5 & RC6 , 2012 .
[10] Chetan Gupta,et al. An Enhanced Secure Image Cryptography based on RC6 and RSA to Minimize Entropy and Improve Correlation , 2016 .
[11] P. Naskar,et al. A Secure Symmetric Image Encryption Based on Bit-wise Operation , 2014 .
[12] Shujun Li,et al. Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[13] Mohammed Ali Hussain,et al. Performance and Security Analysis for Image Encryption using Key Image , 2015 .
[14] Ariel M. Sison,et al. Enhanced RC6 permutation-diffusion operation for image encryption , 2018, DSIT '18.
[15] Man Young Rhee,et al. Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .
[16] Anupkumar M Bongale,et al. Image Encryption based on FEAL Algorithm , 2013 .
[17] Jawad Ahmad,et al. Efficiency Analysis and Security Evaluation of Image Encryption Schemes , 2012 .
[18] Osama S. Faragallah,et al. Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , 2007, 2007 International Conference on Electrical Engineering.
[19] Mohsen Guizani,et al. The rise of ransomware and emerging security challenges in the Internet of Things , 2017, Comput. Networks.
[20] Salwa K. Abd-El-Hafiz,et al. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review , 2015, Journal of advanced research.
[21] Gaurav Bhatnagar,et al. A secure image encryption algorithm based on polar decomposition , 2018, 2018 IEEE 14th International Colloquium on Signal Processing & Its Applications (CSPA).
[22] Jinsheng Sun,et al. A block cipher based on a suitable use of the chaotic standard map , 2005 .
[23] Jun Wang,et al. Image encryption algorithm based on chaotic system and dynamic S-boxes composed of DNA sequences , 2015, Multimedia Tools and Applications.
[24] Kirti Aggarwal. Comparison of RC6, modified RC6 & enhancement of RC6 , 2015, 2015 International Conference on Advances in Computer Engineering and Applications.
[25] S. Agaian,et al. NPCR and UACI Randomness Tests for Image Encryption , 2011 .
[26] Nisar Ahmed,et al. A Benchmark for Performance Evaluation and Security Assessment of Image Encryption Schemes , 2016 .