An Efficient RC6 based Image Cryptography to Enhance Correlation and Entropy
暂无分享,去创建一个
[1] Pallavi Jain,et al. A Secure Data Sharing and Communication with Multiple Cloud Environments with Java API , 2012 .
[2] Arun Patro,et al. Design and Implementation of Enhanced version of MRC6 algorithm for data security , 2015 .
[3] Wilhelm Burger,et al. Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.
[4] Asoke Nath,et al. MODIFIED MULTI WAY FEEDBACK ENCRYPTION STANDARDVER-2(MWFES-2) , 2013 .
[5] Ioannis Pitas,et al. Digital watermarking: An overview , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[6] P. S. Patheja,et al. Attack Detection in Watermarked Images with PSNR and RGB Intensity , 2013 .
[7] A. K. Dubey,et al. Knowledge discovery with a subset-superset approach for Mining Heterogeneous Data with dynamic support , 2012, 2012 CSI Sixth International Conference on Software Engineering (CONSEG).
[8] Christof Paar,et al. An instruction-level distributed processor for symmetric-key cryptography , 2005, IEEE Transactions on Parallel and Distributed Systems.
[9] Abhijit Mitra,et al. A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .
[10] Nikolaos G. Bourbakis,et al. A General Cryptanalysis of Permutation-Only Multimedia Encryption Algorithms , 2004 .
[11] Seetaiah Kilaru,et al. An effective algorithm for Image security based on Compression and Decomposition method , 2013 .
[12] L Vitali Andrea,et al. Video over IP using standard-compatible multiple description coding: an IETF proposal , 2006 .
[13] Yicong Zhou,et al. A new chaotic system for image encryption , 2012, 2012 International Conference on System Science and Engineering (ICSSE).
[14] Satish Bhalshankar,et al. Audio Steganography: LSB Technique Using a Pyramid Structure and Range of Bytes , 2015, ArXiv.
[15] Modular Arithmetic in RSA Cryptography , 2015 .
[16] Prasanta K. Panigrahi,et al. Wavelets: Applications to image compression-I , 2005 .
[17] Yongdong Wu,et al. On the security of an SVD-based ownership watermarking , 2005, IEEE Transactions on Multimedia.
[18] Chun-Ta Li,et al. A secure three-party authenticated key exchange protocol based on extended chaotic maps in cloud storage service , 2015, 2015 International Conference on Information Networking (ICOIN).
[19] Erkan Besdok,et al. Hiding information in multispectral spatial images , 2005 .
[20] Aloka Sinha,et al. A technique for image encryption using digital signature , 2003 .
[21] Aman Jantan,et al. Image Encryption Using Block-Based Transformation Algorithm , 2008 .
[22] Ahmad Abusukhon,et al. A novel network security algorithm based on private key encryption , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[23] Asoke Nath,et al. Multi Way Feedback Encryption Standard ver-3(MWFES-3) , 2013, 2013 Third World Congress on Information and Communication Technologies (WICT 2013).
[24] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[25] Anil Khandelwal,et al. A Critical Review on Data Clustering in Wireless Network , 2014 .
[26] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[27] A. K. Dubey,et al. Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment , 2012, 2012 CSI Sixth International Conference on Software Engineering (CONSEG).
[28] Frank Y. Shih,et al. An adjusted-purpose digital watermarking technique , 2004, Pattern Recognit..
[29] T. Aaron Gulliver,et al. Secret Key Generation Using Chaotic Signals Over Frequency Selective Fading Channels , 2015, IEEE Transactions on Information Forensics and Security.
[30] Namrata Shukla,et al. Data Mining based Result Analysis of Document Fraud Detection , 2014 .
[31] Reza Boostani,et al. CVC: Chaotic visual cryptography to enhance steganography , 2014, 2014 11th International ISC Conference on Information Security and Cryptology.
[32] Mohamed Fahim Hassan. Synchronization of hyperchaotic systems with application to secure communication , 2015, 2015 Annual IEEE Systems Conference (SysCon) Proceedings.
[33] Hsien-Yu Lee. The implementation and investigation of securing web applications upon multi-platform for a single sign-on functionality , 2016 .
[34] Rajarathnam Chandramouli,et al. Secret key estimation in sequential steganography , 2005, IEEE Transactions on Signal Processing.