CT Image Secret Sharing Based on Chaotic Map and Singular Value Decomposition
暂无分享,去创建一个
Xin Jiang | Mingzhe Liu | Feixiang Zhao | Zhirong Tang | Xianghe Liu | Mingzhe Liu | Xianghe Liu | Xin Jiang | Feixiang Zhao | Zhirong Tang
[1] H. B. Kekre,et al. Partial Image Scrambling Using Walsh Sequency in Sinusoidal Wavelet Transform Domain , 2016 .
[2] Zhen Wu,et al. An improved threshold multi-level image recovery scheme , 2018, J. Inf. Secur. Appl..
[3] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[4] Musheer Ahmad,et al. Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher , 2014, FICTA.
[5] Xiaonan Luo,et al. Integrated chaotic systems for image encryption , 2018, Signal Process..
[6] A. Kanso,et al. A novel image encryption algorithm based on a 3D chaotic map , 2012 .
[7] Ning Ma,et al. Two secret sharing schemes based on Boolean operations , 2007, Pattern Recognit..
[8] E. Solak,et al. Cryptanalysis of a chaos-based image encryption algorithm , 2009 .
[9] P. Grassberger,et al. On the symbolic dynamics of the Henon map , 1989 .
[10] Qing Zhou,et al. A novel image encryption algorithm based on self-adaptive wave transmission , 2010, Signal Process..
[11] Chin-Chen Chang,et al. A novel image protection scheme using bit-plane compression and secret sharing , 2017 .
[12] Kuang-Shyr Wu. A secret image sharing scheme for light images , 2013, EURASIP J. Adv. Signal Process..
[13] G. Ye. A block image encryption algorithm based on wave transmission and chaotic systems , 2013, Nonlinear Dynamics.
[14] Abderrahim Saaidi,et al. A Novel Image Encryption Algorithm Based on the Two-Dimensional Logistic Map and the Latin Square Image Cipher , 2015 .
[15] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[16] Qiang Zhang,et al. Image Encryption Algorithm Based on Chaotic Modulation of Arnold Dual Scrambling and DNA Computing , 2011 .
[17] Jui-Lin Lai,et al. Image security system using recursive cellular automata substitution , 2007, Pattern Recognit..
[18] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[19] Karel Vlcek,et al. Image Encryption In Wavelet Domain Based on Chaotic Maps , 2009, 2009 2nd International Congress on Image and Signal Processing.
[20] Sos S. Agaian,et al. Two Fibonacci P-code based image scrambling algorithms , 2008, Electronic Imaging.
[21] Xiaofeng Liao,et al. Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation , 2018, Signal Process..
[22] Guo-Qiang Han,et al. The Application of Chaos and DWT in Image Scrambling , 2006, 2006 International Conference on Machine Learning and Cybernetics.
[23] Ran-Zan Wang,et al. Secret image sharing with smaller shadow images , 2006, Pattern Recognit. Lett..
[24] Xing-yuan Wang,et al. A chaotic image encryption algorithm based on perceptron model , 2010 .
[25] Ching-Nung Yang,et al. Constructions and properties of k out of n scalable secret image sharing , 2010 .
[26] S. Li,et al. Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.
[27] Yong Zhang. Cryptanalysis of an Image Encryption Algorithm Based on Chaotic Modulation of Arnold Dual Scrambling and DNA Computing , 2014 .
[28] Olu Lafe. Data compression and encryption using cellular automata transforms , 1997 .
[29] Xiaonan Luo,et al. A Parameter-Selection-Based Chaotic System , 2019, IEEE Transactions on Circuits and Systems II: Express Briefs.
[30] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[31] Ching-Nung Yang,et al. New extended visual cryptography schemes with clearer shadow images , 2014, Inf. Sci..
[32] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[33] Hejiao Huang,et al. 2D Logistic-Sine-coupling map for image encryption , 2018, Signal Process..
[34] Adi Shamir,et al. How to share a secret , 1979, CACM.
[35] Ziba Eslami,et al. An authenticated image encryption scheme based on chaotic maps and memory cellular automata , 2013 .
[36] Nikolaos G. Bourbakis,et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..
[37] Hsien-Chu Wu,et al. Color Visual Cryptography Scheme Using Meaningful Shares , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[38] Sos S. Agaian,et al. Design of image cipher using latin squares , 2014, Inf. Sci..
[39] Barry G. Blundell,et al. On Alternative Approaches to 3D Image Perception: Monoscopic 3D Techniques , 2015 .
[40] Rhouma Rhouma,et al. Cryptanalysis of a new image encryption algorithm based on hyper-chaos , 2008 .
[41] H. T. Panduranga,et al. Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher , 2014 .
[42] Tao Xie,et al. Breaking a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system , 2014 .