Securing Images Using Inversion and Shifting
暂无分享,去创建一个
[1] Charles Schwartz. A New Graphical Method for Encryption of Computer Data , 1991, Cryptologia.
[2] Shujun Li,et al. On the security of an image encryption method , 2002, Proceedings. International Conference on Image Processing.
[3] Jiun-In Guo,et al. A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).
[4] Xiaojun Tong,et al. Image encryption with compound chaotic sequence cipher shifting dynamically , 2008, Image Vis. Comput..
[5] Ram Ratan,et al. Key Independent Retrieval of Chaotic Encrypted Images , 2009, PReMI.
[6] Ram Ratan. Key Independent Decryption of Graphically Encrypted Images , 2010, PAISI.
[7] Nikolaos G. Bourbakis,et al. Image and video encryption using SCAN patterns , 2004, Pattern Recognit..
[8] Stephen G. Wilson,et al. Digital Modulation and Coding , 1995 .
[9] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[10] Jiun-In Guo,et al. A new image encryption algorithm and its VLSI architecture , 1999, 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Implementation (Cat. No.99TH8461).
[11] William Stallings,et al. Cryptography and network security , 1998 .
[12] T. Kohda,et al. Statistics of chaotic binary sequences , 1997, IEEE Trans. Inf. Theory.
[13] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[14] Min Long,et al. A Chaos-Based Data Encryption Algorithm for Image/Video , 2010, 2010 Second International Conference on Multimedia and Information Technology.
[15] Nikolaos G. Bourbakis,et al. Picture data encryption using scan patterns , 1992, Pattern Recognit..
[16] Yuan-Chung Chin,et al. Cryptanalysis on Schwartz Graphical Encryption Method , 1993, Cryptologia.
[17] Zhiliang Zhu,et al. A Chaotic Image Encryption Scheme Based on Circular Bit Shift Method , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[18] Abhijit Mitra,et al. A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .
[19] C. E. Veni Madhavan,et al. Steganography based Information Security , 2002 .