Homomorphic image encryption
暂无分享,去创建一个
[1] Guanrong Chen,et al. A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.
[2] Chin-Chen Chang,et al. A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..
[3] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[4] S. Li,et al. Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.
[5] Guanrong Chen,et al. Chaos-Based Image Encryption , 2005 .
[6] Osama S. Farag Allah,et al. Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images , 2007 .
[7] Guanrong Chen,et al. Chaos-Based Encryption for Digital Images and Videos , 2004 .
[8] V. Chandrasekaran,et al. Integrated Confusion-Diffusion Mechanisms for Chaos Based Image Encryption , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.
[9] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[10] Narendra Singh,et al. Optical image encryption using fractional Fourier transform and chaos , 2008 .
[11] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[12] Yikui Zhai,et al. Improving Image Encryption Using Multi-Chaotic Map , 2008, 2008 Workshop on Power Electronics and Intelligent Transportation System.
[13] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[14] Xuanqin Mou,et al. Chaotic encryption scheme for real-time digital video , 2002, IS&T/SPIE Electronic Imaging.
[15] Osama S. Faragallah,et al. An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.
[16] Osama M. Abu Zaid,et al. Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms , 2007, Int. J. Netw. Secur..
[17] E. Bradley. AUTONOMOUS EXPLORATION AND CONTROL OF CHAOTIC SYSTEMS , 1995 .
[18] Nikolaos G. Bourbakis,et al. Image encryption method using a class of fractals , 1995, J. Electronic Imaging.
[19] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[20] Jae S. Lim,et al. Two-Dimensional Signal and Image Processing , 1989 .
[21] Aloka Sinha,et al. A technique for image encryption using digital signature , 2003 .
[22] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[23] Henry Ker-Chang Chang,et al. A linear quadtree compression scheme for image encryption , 1997, Signal Process. Image Commun..
[24] Chung Jung Kuo,et al. Novel image encryption technique and its application in progressive transmission , 1993, J. Electronic Imaging.
[25] William Stallings,et al. THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.
[26] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .