Comparative Image Encryption Method Analysis Using New Transformed - Mapped Technique
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Hong-Ye Gao,et al. Wavelet analysis [for signal processing] , 1996 .
[3] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[4] William Puech,et al. A new crypto-watermarking method for medical images safe transfer , 2004, 2004 12th European Signal Processing Conference.
[5] X. Liao,et al. An image encryption approach based on chaotic maps , 2005 .
[6] Jinsheng Sun,et al. A block cipher based on a suitable use of the chaotic standard map , 2005 .
[7] Mayank Mishra,et al. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping , 2006 .
[8] P. Raviraj. The Modified 2D-Haar Wavelet Transformation in Image Compression , 2007 .
[9] Sunil Kumar Muttoo,et al. DATA HIDING IN JPEG IMAGES , 2008 .
[10] Guanrong Chen,et al. On the security of a class of image encryption schemes , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[11] Ahmad T. Al-Taani,et al. A Novel Steganographic Method for Gray-Level Images , 2009 .
[12] Musheer Ahmad,et al. A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping , 2009 .
[13] S. Mishra,et al. Image Compression Using Wavelet Packet Tree , 2010 .
[14] Musheer Ahmad,et al. Chaotic image encryption algorithm based on frequency domain scrambling , 2010 .
[15] Jun-jie Chen,et al. A chaos-based digital image encryption scheme with an improved diffusion strategy. , 2012, Optics express.