A Novel Image Encryption Scheme Based on Clifford Attractor and Noisy Logistic Map for Secure Transferring Images in Navy
暂无分享,去创建一个
[1] Xiaolin Wu,et al. Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficients , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.
[2] Sos S. Agaian,et al. Shannon Entropy based Randomness Measurement and Test for Image Encryption , 2011, Inf. Sci..
[3] Kyoung-Joung Lee,et al. SVM Classifier for the Detection of Ventricular Fibrillation , 2005 .
[4] Clifford A. Pickover,et al. A note on rendering 3-D strange-attractors , 1988, Comput. Graph..
[5] Ivan Zelinka,et al. Evolutionary Algorithms and Chaotic Systems , 2010, Evolutionary Algorithms and Chaotic Systems.
[6] Park Sung-Ho,et al. Ciphering Scheme and Hardware Implementation for MPEG-based Image/Video Security , 2005 .
[7] Lei Yang,et al. A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models , 2012 .
[8] Yicong Zhou,et al. 2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..
[9] Sos S. Agaian,et al. Local Shannon entropy measure with statistical tests for image randomness , 2013, Inf. Sci..
[10] Xiao Liu,et al. A novel chaos-based bit-level permutation scheme for digital image encryption , 2011 .
[11] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[12] N. K. Pareek,et al. Modified substitution-diffusion image cipher using chaotic standard and logistic maps , 2010 .
[13] Ljupco Kocarev,et al. Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.
[14] M. Baptista. Cryptography with chaos , 1998 .
[15] Xing-yuan Wang,et al. A new image alternate encryption algorithm based on chaotic map , 2014, Nonlinear Dynamics.
[16] Robert A. J. Matthews,et al. On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.
[17] C. M. Place. Dynamical Systems: Differential Equations, Maps, and Chaotic Behaviour , 1992 .
[18] Jiun-In Guo,et al. A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).
[19] Sos S. Agaian,et al. Design of image cipher using latin squares , 2014, Inf. Sci..
[20] Julien Clinton Sprott,et al. How common is chaos , 1993 .
[21] Brian Dangerfield,et al. Complex systems in finance and econometrics , 2011 .
[22] Dong-Wook Kim,et al. Efficient Encryption Technique of Image using Packetized Discrete Wavelet Transform , 2013 .
[23] J. Sprott. Strange Attractors: Creating Patterns in Chaos , 1993 .
[24] Stefano Zucca,et al. Numerical assessment of friction damping at turbine blade root joints by simultaneous calculation of the static and dynamic contact loads , 2012 .
[25] Andreas Uhl,et al. Wavelet packet methods for multimedia compression and encryption , 2001, 2001 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (IEEE Cat. No.01CH37233).
[26] Ghassan Al-Regib,et al. Improved selective encryption techniques for secure transmission of MPEG video bit-streams , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).