A secure symmetric image encryption based on linear geometry
暂无分享,去创建一个
[1] Wilhelm Burger,et al. Digital Image Processing - An Algorithmic Introduction using Java , 2008, Texts in Computer Science.
[2] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[3] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[4] Shujun Li,et al. Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[5] M. El Henawy,et al. On Wavelets Applications in Image Compression , 2003, Egypt. Comput. Sci. J..
[6] Ibrahim Sogukpinar,et al. Analysis and Comparison of Image Encryption Algorithms , 2007 .
[7] P. V. Oorschot. Overview of Cryptography , .
[8] Nikolaos G. Bourbakis,et al. Image and video encryption using SCAN patterns , 2004, Pattern Recognit..
[9] Vincent Rijmen,et al. Rijndael, the advanced encryption standard , 2001 .
[10] Chee Kheong Siew,et al. A New Encryption Algorithm for High Throughput Multimedia , 2002 .
[11] Roberto Rinaldo,et al. Video over IP using standard-compatible multiple description coding: An IETF proposal , 2006 .
[12] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[13] Ian F. Blake,et al. An Overview of Cryptography , 2013 .
[14] Kai Wang,et al. On the security of 3D Cat map based symmetric image encryption scheme , 2005 .
[15] Yang Shuangyuan,et al. An asymmetric image encryption based on matrix transformation , 2004, IEEE International Symposium on Communications and Information Technology, 2004. ISCIT 2004..
[16] William C. Barker,et al. TECHNOLOGY ADMINISTRATION , 2004 .
[17] Abhijit Mitra,et al. A New Image Encryption Approach using Combinational Permutation Techniques , 2008 .
[18] Ralph Howard,et al. Data encryption standard , 1987 .
[19] Prasanta K. Panigrahi,et al. Wavelets: Applications to image compression-II , 2005 .