Efficient and secure cipher scheme for multimedia contents
暂无分享,去创建一个
Ali Chehab | Raphaël Couturier | Hassan N. Noura | Mohammad M. Mansour | Mohamad Noura | A. Chehab | H. Noura | R. Couturier | M. Noura
[1] Feng Huang,et al. Security analysis of image encryption based on twodimensional chaotic maps and improved algorithm , 2009 .
[2] Mohammed Ghanbari,et al. Scope of validity of PSNR in image/video quality assessment , 2008 .
[3] Khumanthem Manglem Singh,et al. A robust image encryption scheme based on chaotic system and elliptic curve over finite field , 2017, Multimedia Tools and Applications.
[4] Jason Smith,et al. SIMON and SPECK: Block Ciphers for the Internet of Things , 2015, IACR Cryptol. ePrint Arch..
[5] Kyoji Shibutani,et al. Piccolo: An Ultra-Lightweight Blockcipher , 2011, CHES.
[6] Rhouma Rhouma,et al. Cryptanalysis of a new image encryption algorithm based on hyper-chaos , 2008 .
[7] Ana Cristina Dascalescu,et al. A new hyperchaotic map and its application in an image encryption scheme , 2014, Signal Process. Image Commun..
[8] Nicky Mouha,et al. Report on Lightweight Cryptography , 2017 .
[9] Ali Chehab,et al. A new efficient lightweight and secure image cipher scheme , 2017, Multimedia Tools and Applications.
[10] Shujun Li,et al. Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[11] S. Kyoji,et al. Piccolo: An Ultra-Lightweight Blockcipher , 2011 .
[12] Qing Liu,et al. An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .
[13] Mohammad Reza Mosavi,et al. A novel image encryption based on hash function with only two-round diffusion process , 2013, Multimedia Systems.
[14] Manoj Kumar,et al. FeW: A Lightweight Block Cipher , 2019, IACR Cryptol. ePrint Arch..
[15] Kazuhiko Minematsu,et al. $\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms , 2012, Selected Areas in Cryptography.
[16] Xing-yuan Wang,et al. Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation , 2014 .
[17] Dharma P. Agrawal,et al. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .
[18] Christophe De Vleeschouwer,et al. Overview on Selective Encryption of Image and Video: Challenges and Perspectives , 2008, EURASIP J. Inf. Secur..
[19] Hassan N. Noura,et al. E3SN: Efficient security scheme for sensor networks , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[20] Sattar Mirzakuchaki,et al. A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..
[21] Anne Canteaut,et al. PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version) , 2012, IACR Cryptol. ePrint Arch..
[22] Wenling Wu,et al. LBlock: A Lightweight Block Cipher , 2011, ACNS.
[23] Hassan N. Noura,et al. An image encryption scheme based on irregularly decimated chaotic maps , 2014, Signal Process. Image Commun..
[24] Wei Xiang,et al. Error resilience performance evaluation of H.264 I-frame and JPWL for wireless image transmission , 2010, 2010 4th International Conference on Signal Processing and Communication Systems.
[25] Hassan N. Noura,et al. An efficient and secure cipher scheme for images confidentiality preservation , 2016, Signal Process. Image Commun..
[26] Lars R. Knudsen,et al. Provable security against a differential attack , 1994, Journal of Cryptology.
[27] Xingyuan Wang,et al. Cryptanalysis on a novel image encryption method based on total shuffling scheme , 2011 .
[28] S. Li,et al. Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption , 2009 .
[29] Rafat Parveen,et al. Wavelet based partial image encryption , 2009, 2009 International Multimedia, Signal Processing and Communication Technologies.
[30] Rengarajan Amirtharajan,et al. Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller , 2018, Microprocess. Microsystems.
[31] Tinku Acharya,et al. Image Processing: Principles and Applications , 2005, J. Electronic Imaging.
[32] Zhu Wang,et al. A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator , 2009 .
[33] Safya Belghith,et al. Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .
[34] John Kelsey,et al. Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .
[35] D. Okada,et al. Digital Image Processing for Medical Applications , 2009 .
[36] Stefan Mangard,et al. An Efficient Side-Channel Protected AES Implementation with Arbitrary Protection Order , 2017, CT-RSA.
[37] Yinglong Wang,et al. Cryptanalysis of Two Chaotic Image Encryption Schemes Based on Permutation and XOR Operations , 2008, 2008 International Conference on Computational Intelligence and Security.
[38] Hassan N. Noura,et al. ERDIA: An efficient and robust data integrity algorithm for mobile and wireless networks , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).
[39] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[40] Anil Kumar,et al. Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map , 2010, ICISTM.
[41] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[42] Zhijian Wang,et al. An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm , 2014, TheScientificWorldJournal.
[43] Bhaskar Mondal,et al. A light weight secure image encryption scheme based on chaos & DNA computing , 2017, J. King Saud Univ. Comput. Inf. Sci..
[44] Daesung Kwon,et al. LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors , 2013, WISA.
[45] Mahmoud Al-Ayyoub,et al. Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques , 2017, Multimedia Tools and Applications.
[46] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[47] Hassan N. Noura,et al. EDCA: Efficient diffusion cipher and authentication scheme for Wireless Sensor Networks , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).
[48] Kwok-Tung Lo,et al. Breaking an Image Encryption Algorithm Based on Chaos , 2010, Int. J. Bifurc. Chaos.
[49] Thomas Peyrin,et al. The LED Block Cipher , 2011, IACR Cryptol. ePrint Arch..
[50] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[51] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[52] Sang-Soo Yeo,et al. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..
[53] Wolfgang A. Halang,et al. Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm , 2007, ArXiv.
[54] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[55] B. B. Gupta,et al. Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2017, Multimedia Tools and Applications.
[56] Amir Akhavan,et al. A novel scheme for image encryption based on 2D piecewise chaotic maps , 2010 .
[57] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[58] Eli Biham,et al. Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.
[59] Sean O'Melia,et al. Enhancing the Performance of Symmetric-Key Cryptography via Instruction Set Extensions , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
[60] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[61] Shay Gueron,et al. Intel's New AES Instructions for Enhanced Performance and Security , 2009, FSE.