Multiple-image encryption algorithm based on DNA encoding and chaotic system
暂无分享,去创建一个
[1] Xiaoling Huang,et al. An image encryption algorithm based on hyper-chaos and DNA sequence , 2012, Multimedia Tools and Applications.
[2] Safya Belghith,et al. A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..
[3] Zheng Qin,et al. Data embedding in digital images using critical functions , 2017, Signal Process. Image Commun..
[4] Amit Kumar Singh,et al. Multilevel Encrypted Text Watermarking on Medical Images Using Spread-Spectrum in DWT Domain , 2015, Wireless Personal Communications.
[5] Xuesong Wang,et al. Multiple-image encryption algorithm based on mixed image element and chaos , 2017, Comput. Electr. Eng..
[6] Zhu We,et al. Multiple-image Encryption Based on Wavelet Transform and Improved Double Random Phase Encoding , 2014 .
[7] Xingyuan Wang,et al. Image encryption using DNA complementary rule and chaotic maps , 2012, Appl. Soft Comput..
[8] Sattar Mirzakuchaki,et al. Breaking an image encryption algorithm based on the new substitution stage with chaotic functions , 2016 .
[9] Qiang Zhang,et al. A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system , 2013 .
[10] Xiao-Qiang Zhang,et al. Mixed image element encryption algorithm based on an elliptic curve cryptosystem , 2008, J. Electronic Imaging.
[11] Zhenjun Tang,et al. Efficient image encryption with block shuffling and chaotic map , 2014, Multimedia Tools and Applications.
[12] Qiao Tian,et al. Research on tridiagonal matrix solver design based on a combination of processors , 2017, Comput. Electr. Eng..
[13] Xingyuan Wang,et al. A novel chaotic image encryption scheme using DNA sequence operations , 2015 .
[14] Feng Zhang,et al. Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform , 2015 .
[15] Qiang Liu,et al. A novel image encryption algorithm based on chaos and Line map , 2015, Neurocomputing.
[16] Di Xiao,et al. An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules , 2014, Multimedia Tools and Applications.
[17] Qiang Zhang,et al. A RGB image encryption algorithm based on DNA encoding and chaos map , 2009, Comput. Electr. Eng..
[18] Yiran Chen,et al. A novel chaos-based image encryption algorithm using DNA sequence operations , 2017 .
[19] Ping Liu,et al. An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems , 2016 .
[20] Wei Zhang,et al. Micro-lens array based 3-D color image encryption using the combination of gravity model and Arnold transform , 2015 .
[21] Shilong Ma,et al. Remote-sensing image encryption in hybrid domains , 2012 .
[22] Arun Kumar Sangaiah,et al. Medical JPEG image steganography based on preserving inter-block dependencies , 2017, Comput. Electr. Eng..
[23] Yuansheng Liu,et al. Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map , 2013, 1307.4279.
[24] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[25] Wei Liang,et al. Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update , 2015, Int. J. Commun. Syst..
[26] Xing-Yuan Wang,et al. Color image encryption scheme using CML and DNA sequence operations , 2016, Biosyst..
[27] Z. Jane Wang,et al. Correlation-and-bit-aware additive spread spectrum data hiding for Laplacian distributed host image signals , 2014, Signal Process. Image Commun..
[28] Xin Liao,et al. Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform , 2017, Multimedia Tools and Applications.
[29] Xuesong Wang,et al. Multiple-image encryption algorithm based on mixed image element and permutation , 2017 .
[30] Zhenjun Tang,et al. Multiple-image encryption with bit-plane decomposition and chaotic maps , 2016 .
[31] Hadi Seyedarabi,et al. A new secure and sensitive image encryption scheme based on new substitution with chaotic function , 2014, Multimedia Tools and Applications.
[32] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.