A novel cellular automata based technique for visual multimedia content encryption
暂无分享,去创建一个
Georgios Ch. Sirakoulis | Savvas A. Chatzichristofis | Yiannis S. Boutalis | Dimitris A. Mitzias | G. Sirakoulis | Y. Boutalis | S. Chatzichristofis | D. Mitzias
[1] V. Chandrasekaran,et al. Integrated Confusion-Diffusion Mechanisms for Chaos Based Image Encryption , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.
[2] Georgios Ch. Sirakoulis,et al. A CAD system for the construction and VLSI implementation of Cellular Automata algorithms using VHDL , 2003, Microprocess. Microsystems.
[3] Ioannis G. Karafyllidis,et al. Study of lithography profiles developed on non-planar Si surfaces , 1999 .
[4] Yiannis S. Boutalis,et al. Accurate Image Retrieval Based on Compact Composite Descriptors and Relevance Feedback Information , 2010, Int. J. Pattern Recognit. Artif. Intell..
[5] Basil G. Mertzios,et al. Applications of coordinate logic filters in image analysis and pattern recognition , 2001, ISPA 2001. Proceedings of the 2nd International Symposium on Image and Signal Processing and Analysis. In conjunction with 23rd International Conference on Information Technology Interfaces (IEEE Cat..
[6] Zengqiang Chen,et al. A new image encryption algorithm based on hyper-chaos , 2008 .
[7] Olu Lafe. Data compression and encryption using cellular automata transforms , 1997 .
[8] Andrew Adamatzky,et al. Identification of Cellular Automata , 2018, Encyclopedia of Complexity and Systems Science.
[9] Stephen Wolfram,et al. Universality and complexity in cellular automata , 1983 .
[10] Talya Porat,et al. Lecture Notes in Computer Science (LNCS) , 2007 .
[11] G. Sirakoulis,et al. A cellular automaton model for the effects of population movement and vaccination on epidemic propagation , 2000 .
[12] Santanu Chattopadhyay,et al. Cellular Automata-Based Recursive Pseudoexhaustive Test Pattern Generator , 2001, IEEE Trans. Computers.
[13] R. Feynman. Simulating physics with computers , 1999 .
[14] Georgios Ch. Sirakoulis,et al. A TCAD system for VLSI implementation of the CVD process using VHDL , 2004, Integr..
[15] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[16] Shutian Liu,et al. Image sharing scheme based on combination theory , 2008 .
[17] Yiannis S. Boutalis,et al. CEDD: Color and Edge Directivity Descriptor: A Compact Descriptor for Image Indexing and Retrieval , 2008, ICVS.
[18] John von Neumann,et al. Theory Of Self Reproducing Automata , 1967 .
[19] 上野 文男,et al. 2006 IEEE International Symposium on Circuits and Systems (ISCAS 2006) , 2007 .
[20] S. Omohundro. Modelling cellular automata with partial differential equations , 1984 .
[21] Ioannis G. Karafyllidis,et al. A methodology for VLSI implementation of Cellular Automata algorithms using VHDL , 2001 .
[22] Tughrul Arslan,et al. IEEE International Symposium on Circuits and Systems (ISCAS 2005) , 2005 .
[23] James Ze Wang,et al. SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture LIbraries , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[24] B. K. Panigrahi,et al. ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE , 2010 .
[25] V. Paxson,et al. Notices of the American Mathematical Society , 1998 .
[26] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[27] Josef Scharinger. Fast encryption of image data using chaotic Kolmogorov flows , 1998, J. Electronic Imaging.
[28] Chang-Mok Shin,et al. Image encryption using modified exclusive-OR rules and phase-wrapping technique , 2005 .
[29] S. L. Gilbert,et al. NIST Special Publication 260-133 2001 Edition , 2001 .
[30] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[31] Kuo-Liang Chung,et al. Large encrypting binary images with higher security , 1998, Pattern Recognit. Lett..
[32] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[33] Nikolaos G. Bourbakis,et al. Picture data encryption using scan patterns , 1992, Pattern Recognit..
[34] Jui-Lin Lai,et al. Image security system using recursive cellular automata substitution , 2007, Pattern Recognit..
[35] Albert Y. Zomaya,et al. Cellular automata computations and secret key cryptography , 2004, Parallel Comput..
[36] Bialynicki-Birula. Weyl, Dirac, and Maxwell equations on a lattice as unitary cellular automata. , 1994, Physical review. D, Particles and fields.
[37] Bruce D. Malamud,et al. Cellular-automata models applied to natural hazards , 2000, Comput. Sci. Eng..
[39] Bastien Chopard,et al. Cellular Automata Modeling of Physical Systems: Index , 1998 .
[40] Panagiotis Tzionas,et al. A cellular automaton for the determination of the mean velocity of moving objects and its VLSI implementation , 1996, Pattern Recognit..