Image encryption based on Independent Component Analysis and Arnold’s Cat Map
暂无分享,去创建一个
[1] R. Liu,et al. NEW ALGORITHM FOR COLOR IMAGE ENCRYPTION USING CHAOTIC MAP AND SPATIAL BIT-LEVEL PERMUTATION 1 , 2012 .
[2] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[3] Chittaranjan Pradhan,et al. Imperceptible Watermarking Technique using Arnold's Transform and Cross Chaos Map in DCT Domain , 2012 .
[4] S. S. Karimi Madahi,et al. Speech Signal Encryption Using Chaotic Symmetric Cryptography , 2012 .
[5] Abir Awad,et al. A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods , 2010, IACR Cryptol. ePrint Arch..
[6] K.C. Ravishankar,et al. Region based selective image encryption , 2006, 2006 International Conference on Computing & Informatics.
[7] Fei Xiang,et al. An Image Encryption Algorithm Based on Scrambling and Substitution Using Hybrid Chaotic Systems , 2011, CIS.
[8] J. Cardoso,et al. Blind beamforming for non-gaussian signals , 1993 .
[9] Xin Zhang,et al. A new chaotic algorithm for image encryption , 2006 .
[10] Haiying Zhao,et al. An Efficient Chaos-based Image Encryption Scheme Using Affine Modular Maps , 2012 .
[11] Pierre Comon,et al. Handbook of Blind Source Separation: Independent Component Analysis and Applications , 2010 .
[12] Ying-Ke Lei,et al. An algorithm for underdetermined mixing matrix estimation , 2013, Neurocomputing.
[13] Mohsen Rahmani,et al. A new modified version of Advanced Encryption Standard based algorithm for image encryption , 2010, 2010 International Conference on Electronics and Information Engineering.
[14] N. Xuan,et al. Digital image encryption algorithm based on chaos and improved DES , 2009, 2009 IEEE International Conference on Systems, Man and Cybernetics.
[15] Jean-Francois Cardoso,et al. Blind signal separation: statistical principles , 1998, Proc. IEEE.
[16] Qiu-Hua Lin,et al. Secure image communication using blind source separation , 2004, Proceedings of the IEEE 6th Circuits and Systems Symposium on Emerging Technologies: Frontiers of Mobile and Wireless Communication (IEEE Cat. No.04EX710).
[17] Erkki Oja,et al. Independent component analysis: algorithms and applications , 2000, Neural Networks.
[18] P. Mythili,et al. Matrix based cryptographic procedure for efficient image encryption , 2011, 2011 IEEE Recent Advances in Intelligent Computational Systems.
[19] Zhiliang Zhu,et al. An Efficient Encryption Algorithm Based on Image Reconstruction , 2009, 2009 International Workshop on Chaos-Fractals Theories and Applications.
[20] Bhiksha Raj,et al. Active-Set Newton Algorithm for Overcomplete Non-Negative Representations of Audio , 2013, IEEE Transactions on Audio, Speech, and Language Processing.