Image Cryptography using Complex Quadratic Map
暂无分享,去创建一个
[1] Chinta Somswara Rao,et al. IMPLEMENTATION OF OBJECT ORIENTED ENCRYPTION SYSTEM USING LAYERED CELLULAR AUTOMATA , 2011 .
[2] Changda Wang,et al. A Lightweight Encryption Method for Privacy Protection in Surveillance Videos , 2018, IEEE Access.
[3] Suryadi Mt,et al. Performance of Chaos-Based Encryption Algorithm for Digital Image , 2014 .
[4] R. Devaney. An Introduction to Chaotic Dynamical Systems , 1990 .
[5] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[6] Son Bao Pham,et al. Improving the Quality of Word Alignment by Integrating Pearson's Chi-Square Test Information , 2012, 2012 International Conference on Asian Language Processing.
[7] Xin Zhang,et al. Implementation of Mandelbrot set and Julia Set on SOPC platform , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).
[8] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[9] Charles F. Hockett,et al. A mathematical theory of communication , 1948, MOCO.
[10] Mohamed Elhoseny,et al. An Efficient Optimal Key Based Chaos Function for Medical Image Security , 2018, IEEE Access.
[11] Ljupco Kocarev,et al. Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.
[12] Anuja Bhargava,et al. Chaos based image encryption using two step iterated logistic map , 2016, 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE).
[13] The Transition Between the Complex Quadratic Map and the Hénon Map , 2012 .
[14] J. Perry,et al. Chaos in real data : analysis of non-linear dynamics from short ecological time-series , 2000 .
[15] Gholamreza Anbarjafari,et al. Iterative back projection based image resolution enhancement , 2013, 2013 8th Iranian Conference on Machine Vision and Image Processing (MVIP).
[16] Michael B. Bonsall,et al. Chaos in Real Data. The Analysis of Non‐Linear Dynamics from Short Ecological Time Series , 2001 .
[17] Kalamullah Ramli,et al. A Secure and Robust Image Encryption Based on Chaotic Permutation Multiple Circular Shrinking and Expanding , 2016, J. Inf. Hiding Multim. Signal Process..
[18] N. Lazar,et al. The ASA Statement on p-Values: Context, Process, and Purpose , 2016 .
[19] K. Gopakumar,et al. Private key encryption of speech signal based on three dimensional chaotic map , 2017, 2017 International Conference on Communication and Signal Processing (ICCSP).
[20] Madhumita Panda. Performance analysis of encryption algorithms for security , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).
[21] S Arul Thileeban. Encryption of images using XOR Cipher , 2016, 2016 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC).
[22] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .