Proposed Method for Multimedia Data Security Using Cyclic Elliptic Curve, Chaotic System, and Authentication Using Neural Network
暂无分享,去创建一个
[1] G. Mullen,et al. Primitive polynomials over finite fields , 1992 .
[2] M. Aswatha Kumar,et al. Random Binary and Non-Binary Sequences Derived from Random Sequence of Points on Cyclic Elliptic Curve Over Finite Field GF(2 m ) and Their Properties , 2010, Inf. Secur. J. A Glob. Perspect..
[3] M. Aswatha Kumar,et al. Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points. , 2011 .
[4] Danilo P. Mandic,et al. Recurrent Neural Networks for Prediction , 2001 .
[5] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[6] P. P. Deepthi,et al. New stream ciphers based on elliptic curve point multiplication , 2009, Comput. Commun..
[7] Maciej Blaszak,et al. From Bi-Hamiltonian Geometry to Separation of Variables: Stationary Harry-Dym and the KdV Dressing Chain , 2002, nlin/0202001.
[8] James C. Bezdek,et al. On the relationship between neural networks, pattern recognition and intelligence , 1992, Int. J. Approx. Reason..
[9] M. A. Jafarizadeh,et al. Hierarchy of Chaotic Maps with an Invariant Measure and their Compositions , 2002 .
[10] Li Li,et al. A new image encryption scheme based on cyclic elliptic curve and chaotic system , 2012, Multimedia Tools and Applications.
[11] Chien-Chang Chen,et al. Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.
[12] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[13] M.I. Aziz,et al. Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.
[14] Amir Akhavan,et al. A symmetric image encryption scheme based on combination of nonlinear chaotic maps , 2011, J. Frankl. Inst..
[15] Jessica J. Fridrich,et al. Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.