Application of chaos theory in data security-a survey
暂无分享,去创建一个
[1] Arun S Menon,et al. Image encryption based on chaotic algorithms : An overview , 2013 .
[2] Dirk Werner,et al. What's Happening in the Mathematical Sciences? , 2001 .
[3] Xin Zhang,et al. A new chaotic algorithm for image encryption , 2006 .
[4] Robert Gold,et al. Maximal recursive sequences with 3-valued recursive cross-correlation functions (Corresp.) , 1968, IEEE Trans. Inf. Theory.
[5] A. Steffi,et al. Modified Algorithm of Encryption and Decryption of Images using Chaotic Mapping , 2013 .
[6] Luigi Fortuna,et al. Does chaos work better than noise , 2002 .
[7] Xingyuan Wang,et al. A novel chaotic block image encryption algorithm based on dynamic random growth technique , 2015 .
[8] Peter Stavroulakis,et al. Chaos Applications in Telecommunications , 2005 .
[9] Amir Akhavan,et al. A novel dynamic model of pseudo random number generator , 2011, J. Comput. Appl. Math..
[10] Mustafa Türk,et al. Digital Image Encryption Scheme using Chaotic Sequences with a Nonlinear Function , 2012 .
[11] Louis M Pecora,et al. Synchronization of chaotic systems. , 2015, Chaos.
[12] Carlos Gershenson. Introduction to Chaos in Deterministic Systems , 2003 .
[13] Guoqiang Han,et al. An Enhanced Chaos Based Image Encryption Algorithm , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).
[14] Vinod Patidar,et al. A Random Bit Generator Using Chaotic Maps , 2010, Int. J. Netw. Secur..
[15] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[16] Huang Xiao,et al. An Image Encryption Scheme Based on Chaotic Systems , 2006, 2006 International Conference on Machine Learning and Cybernetics.
[17] J.A. Hernandez,et al. Chaos Theory Applied to Communications -- Part I: Chaos Generators , 2007, Electronics, Robotics and Automotive Mechanics Conference (CERMA 2007).
[18] S. V. Sathyanarayana,et al. Image encryption scheme with key sequences based on Chaotic functions , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).
[19] Asem Mohammad Al-Najjar,et al. Image Encryption Algorithm Based on Logistic Map and Pixel Mapping Table , 2011 .
[20] Hyoungshick Kim,et al. An image encryption scheme with a pseudorandom permutation based on chaotic maps , 2010 .
[21] J. Tennyson. In the wake of chaos. Unpredictable order in dynamical systems , 1995 .
[22] Luigi Fortuna,et al. Chaotic sequences to improve the performance of evolutionary algorithms , 2003, IEEE Trans. Evol. Comput..
[23] Xiaoling Huang,et al. A NEW DIGITAL IMAGE ENCRYPTION ALGORITHM BASED ON 4D CHAOTIC SYSTEM , 2012 .
[24] Charles Herring,et al. Random number generators are chaotic , 1989, CACM.
[25] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[26] A Prime Case of Chaos , .
[27] Zengqiang Chen,et al. A new image encryption algorithm based on hyper-chaos , 2008 .