A New Hybrid Chaotic Map and Its Application on Image Encryption and Hiding
暂无分享,去创建一个
[1] D. Baleanu,et al. Discrete fractional logistic map and its chaos , 2014 .
[2] Xing-yuan Wang,et al. A chaotic image encryption algorithm based on perceptron model , 2010 .
[3] Bernd Girod,et al. Digital watermarking of text, image, and video documents , 1998, Comput. Graph..
[4] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[5] D. K. Branstad,et al. Data Encryption Standard: past and future , 1988, Proc. IEEE.
[6] X. Mou,et al. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .
[7] K. Ikeda. Multiple-valued stationary state and its instability of the transmitted light by a ring cavity system , 1979 .
[8] Ljupco Kocarev,et al. Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.
[9] Guanrong Chen,et al. On the security defects of an image encryption scheme , 2009, Image Vis. Comput..
[10] P. Verhulst. Recherches mathématiques sur la loi d’accroissement de la population , 2022, Nouveaux mémoires de l'Académie royale des sciences et belles-lettres de Bruxelles.
[11] Zengqiang Chen,et al. A new image encryption algorithm based on hyper-chaos , 2008 .
[12] Robert A. J. Matthews,et al. On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.
[13] Michael S. Gaines,et al. Biological Populations with Nonoverlapping Generations : Stable Points , Stable Cycles , and Chaos , 2007 .
[14] S. Agaian,et al. NPCR and UACI Randomness Tests for Image Encryption , 2011 .
[15] G. Álvarez,et al. Cryptanalysis of an ergodic chaotic cipher , 2003 .
[16] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[17] William Stallings,et al. Cryptography and network security , 1998 .
[18] G. Álvarez,et al. Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .
[19] Kwok-Wo Wong,et al. A Fast Image Encryption Scheme based on Chaotic Standard Map , 2006, ArXiv.
[20] Alessandro Cilardo,et al. Elliptic Curve Cryptography Engineering , 2006, Proceedings of the IEEE.
[21] A. Akhavan,et al. A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .
[22] Michael Ganley,et al. Encryption algorithms , 1992 .
[23] Naser Pariz,et al. A chaotic secure communication scheme using fractional chaotic systems based on an extended fractional Kalman filter , 2009 .
[24] Andreas Uhl,et al. Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security) , 2004 .
[25] Vinod Patidar,et al. Image encryption using chaotic logistic map , 2006, Image Vis. Comput..
[26] Mohammed Ghanbari,et al. Scope of validity of PSNR in image/video quality assessment , 2008 .
[27] Hongjun Liu,et al. Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..
[28] M. Baptista. Cryptography with chaos , 1998 .
[29] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[30] M. Hénon. A two-dimensional mapping with a strange attractor , 1976 .
[31] Vinod Patidar,et al. Cryptography using multiple one-dimensional chaotic maps , 2005 .
[32] A. Wolf,et al. Determining Lyapunov exponents from a time series , 1985 .
[33] Chuan-Kuei Huang,et al. Multi chaotic systems based pixel shuffle for image encryption , 2009 .