A fractal-based image encryption system
暂无分享,去创建一个
Salwa K. Abd-El-Hafiz | Ahmed Gomaa Radwan | M. L. Barakat | Sherif H. Abdel Haleem | A. Radwan | S. Abd-El-Hafiz | M. L. Barakat
[1] Sos S. Agaian,et al. Fractal steganography using artificially generated images , 2008, SPIE Defense + Commercial Sensing.
[2] Xing-yuan Wang,et al. A new compound mode of confusion and diffusion for block encryption of image based on chaos , 2010 .
[3] Ahmed G. Radwan,et al. Generalized Hardware Post‐processing Technique for Chaos‐Based Pseudorandom Number Generators , 2013 .
[4] A. Radwan,et al. Image encryption in the fractional-order domain , 2012, 2012 International Conference on Engineering and Technology (ICET).
[5] Chin-Chen Chang,et al. A DCT-domain system for hiding fractal compressed images , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[6] Yu Zhang,et al. A Steganography Scheme Based on Fractal Images , 2011, 2011 Second International Conference on Networking and Distributed Computing.
[7] S. Li,et al. Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.
[8] Hongjun Liu,et al. Triple-image encryption scheme based on one-time key stream generated by chaos and plain images , 2013, J. Syst. Softw..
[9] Bulusu Rama,et al. Game-enabling the 3D-Mandelbulb Fractal by adding Velocity-induced Support Vectors , 2012 .
[10] Xingyuan Wang,et al. A novel image encryption algorithm using chaos and reversible cellular automata , 2013, Commun. Nonlinear Sci. Numer. Simul..
[11] Yuan-yuan Sun,et al. An Image Encryption Algorithm Utilizing Mandelbrot Set , 2010, 2010 International Workshop on Chaos-Fractal Theories and Applications.
[12] Salwa K. Abd-El-Hafiz. Efficient Detection of Function Clones in Software Systems using the Fractal Dimension and Metrics , 2011 .
[13] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[14] Zhenfeng Zhang,et al. Chaotic encryption algorithm based on alternant of stream cipher and block cipher , 2011 .
[15] Ahmed A. Abd El-Latif,et al. A chaotic block cipher algorithm for image cryptosystems , 2010 .
[16] M. Keyvanpour,et al. A new encryption method for secure embedding in image watermarking , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[17] Guanrong Chen,et al. Chaos-Based Image Encryption , 2005 .
[18] Mamta Juneja,et al. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[19] Claudia Feregrino Uribe,et al. Watermarking Based on Iterated Function Systems , 2009, 2009 Mexican International Conference on Computer Science.
[20] A. Radwan,et al. MOS realization of the modified Lorenz chaotic system , 2004 .
[21] Ahmed S. Elwakil,et al. 1-d digitally-Controlled multiscroll Chaos Generator , 2007, Int. J. Bifurc. Chaos.
[22] Xingyuan Wang,et al. Image encryption using DNA complementary rule and chaotic maps , 2012, Appl. Soft Comput..
[23] Xiaoling Huang,et al. Image encryption algorithm using chaotic Chebyshev generator , 2011, Nonlinear Dynamics.
[24] Mohammed Affan Zidan,et al. Random number generation based on digital differential chaos , 2011, 2011 IEEE 54th International Midwest Symposium on Circuits and Systems (MWSCAS).
[25] S. Agaian,et al. NPCR and UACI Randomness Tests for Image Encryption , 2011 .
[26] Paul S. Addison,et al. Fractals and Chaos: An Illustrated Course , 1997 .
[27] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[28] Donald M. Monro,et al. Rendering algorithms for deterministic fractals , 1995, IEEE Computer Graphics and Applications.
[29] M. Khedr,et al. A hybrid fractal-wavelet data hiding technique , 2008, 2008 National Radio Science Conference.
[30] Hongjun Liu,et al. Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..
[31] Azman Samsudin,et al. Compression-Encryption Based on Fractal Geometric , 2010, 2010 Second International Conference on Computer Research and Development.
[32] J. Hoffstein,et al. An introduction to mathematical cryptography , 2008 .
[33] Nadia M. G. Al-Saidi,et al. Using IFS as an Encryption Method , 2009, 2009 International Conference on Education Technology and Computer.
[34] C. King. Exploding the Dark Heart of Chaos: Part III , 2012 .
[35] Salwa K. Abd-El-Hafiz,et al. A Metrics-Based Data Mining Approach for Software Clone Detection , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.