Image Encryption for mobile devices
暂无分享,去创建一个
[1] A. Giniatoulline,et al. Essential spectrum of the operators generated by PDE systems of stratified fluids and Lp-estimates for the solutions , 2005, Int. J. Comput. Sci. Appl..
[2] Paul M. Chau,et al. Image encryption for secure Internet multimedia applications , 2000, 2000 Digest of Technical Papers. International Conference on Consumer Electronics. Nineteenth in the Series (Cat. No.00CH37102).
[3] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[4] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[5] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[6] Aman Jantan,et al. Image Encryption Using Block-Based Transformation Algorithm , 2008 .
[7] Behrouz A. Forouzan. Cryptography & Network Security , 2007 .
[8] Ennio Gambi,et al. A new chaotic algorithm for video encryption , 2002, IEEE Trans. Consumer Electron..
[9] Chaur-Chin Chen. RSA scheme with MRF and ECC for data encryption , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[10] William Stallings,et al. Cryptography and network security , 1998 .
[11] Alfred Menezes,et al. The State of Elliptic Curve Cryptography , 2000, Des. Codes Cryptogr..
[12] Subramania Sudharsanan. Shared key encryption of JPEG color images , 2005, IEEE Transactions on Consumer Electronics.
[13] Chaur-Chin Chen. Data Encryption Using MRF with an RSA Key , 2001, IEEE Pacific Rim Conference on Multimedia.