Password Protected Visual Cryptography via Cellular Automaton Rule 30
暂无分享,去创建一个
[1] Sang-Yi Yi,et al. Encryption of cell-oriented computer generated hologram by using visual cryptography , 1999, Technical Digest. CLEO/Pacific Rim '99. Pacific Rim Conference on Lasers and Electro-Optics (Cat. No.99TH8464).
[2] Roman V. Yampolskiy,et al. Boundary Conditions for the Digital Forensic Use of Electronic Evidence and The Need for Forensic Counter-Analysis , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[3] Ángel Martín del Rey,et al. Encryption of Images with 2-dimensional Cellular Automata , 2002 .
[4] Rached Tourki,et al. Design of Reconfigurable Image Encryption Processor Using 2-D Cellular Automata Generator , 2009, Int. J. Comput. Sci. Appl..
[5] G. Prema,et al. Steganography using Genetic Algorithm along with Visual Cryptography for wireless network application , 2013, 2013 International Conference on Information Communication and Embedded Systems (ICICES).
[6] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[7] D. Stinson. Visual cryptography and threshold schemes , 1999 .
[8] Lawrence O'Gorman,et al. Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[9] Zhi Zhou,et al. Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.
[10] G. S. Anandha Mala,et al. A novel visual secret sharing scheme for multiple secrets via error diffusion in halftone visual cryptography , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).
[11] Jui-Lin Lai,et al. Image Encryption/Decryption System using 2-D Cellular Automata , 2006, 2006 IEEE International Symposium on Consumer Electronics.
[12] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[13] P. M. Main. Extension of secure audio and video data from the NTC through the public switched telephone network , 1997, MILCOM 97 MILCOM 97 Proceedings.
[14] Albert Y. Zomaya,et al. Cellular automata computations and secret key cryptography , 2004, Parallel Comput..
[15] Vitaly Shmatikov,et al. Fast dictionary attacks on passwords using time-space tradeoff , 2005, CCS '05.
[16] Ja-Chen Lin,et al. Hiding data in images by optimal moderately-significant-bit replacement , 2000 .
[17] Lawrence O'Gorman,et al. Photo-image authentication by pattern recognition and cryptography , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[18] Jarkko Kari. Cryptosystems Based on Reversible Cellular Automata , 1992 .
[19] Stephen Wolfram. Cryptography with Cellular Automata , 1985, CRYPTO.
[20] DUSTIN GAGE. CELLULAR AUTOMATA : IS RULE 30 RANDOM ? , 2005 .
[21] G. A. Spanos,et al. Security for real-time MPEG compressed video in distributed multimedia applications , 1996, Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications.
[22] Thierry Pun,et al. Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.
[23] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[24] Abhinav Aggarwal,et al. Novel authentication system using visual cryptography , 2011, 2011 World Congress on Information and Communication Technologies.
[25] S. Wolfram. Random sequence generation by cellular automata , 1986 .
[26] P. Babu Anto,et al. Contrast-Enhanced Visual Cryptography Schemes Based on Additional Pixel Patterns , 2010, 2010 International Conference on Cyberworlds.
[27] Narendra Ahuja,et al. A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[28] I. Mann. Hacking the human [IT security] , 2008 .
[29] J. O'Ruanaidh,et al. Rotation, Translation and Scale Invariant Digital Image Watermarking , 1997 .
[30] Ángel Martín del Rey,et al. A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata , 2005, IbPRIA.
[31] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[32] Puhua Guan,et al. Cellular Automaton Public-Key Cryptosystem , 1987, Complex Syst..
[33] Jiri Fridrich,et al. Applications of data hiding in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).
[34] J. Yan,et al. Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.
[35] Eun-Soo Kim,et al. Encryption of cell-oriented computer generated hologram by using visual cryptography , 1999 .
[36] Feng Liu,et al. Colour visual cryptography schemes , 2008, IET Inf. Secur..
[37] Kijoon Chae,et al. DESIGN OF RECONFIGURABLE IMAGE ENCRYPTION PROCESSOR USING 2-D CELLULAR AUTOMATA GENERATOR , 2009 .
[38] Roman V. Yampolskiy,et al. Steganography and Visual Cryptography in Computer Forensics , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.
[39] Jonathan T. Trostle,et al. Timing attacks against trusted path , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[40] Aggelos Kiayias,et al. BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..
[41] Mohammad Atique,et al. Design of hierarchical visual cryptography , 2012, 2012 Nirma University International Conference on Engineering (NUiCONE).
[42] Ismail Amr Ismail,et al. Self-Adaptive Image Encryption Based on Memory Cellular Automata , 2011, Int. J. Inf. Acquis..
[43] Its'hak Dinstein,et al. Intuition, perception, and secure communication , 1989, IEEE Trans. Syst. Man Cybern..
[44] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[45] R.V. Yampolskiy. Analyzing User Password Selection Behavior for Reduction of Password Space , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[46] Mauro Barni,et al. DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.
[47] Stephen Wolfram,et al. A New Kind of Science , 2003, Artificial Life.