Audio Encryption Using Ameliorated ElGamal Public Key Encryption Over Finite Field
暂无分享,去创建一个
[1] Nasharuddin Zainal,et al. Decomposition by binary codes-based speedy image encryption algorithm for multiple applications , 2015, IET Image Process..
[2] S. F. El-Zoghdy,et al. Transmission of Chaotic-based Encrypted Audio Through OFDM , 2020, Wireless Personal Communications.
[3] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[4] Jiacun Wang,et al. Special issue on multimedia fog/edge computing systems , 2020, Multimedia Systems.
[5] Hongjun Liu,et al. Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys , 2016 .
[6] Artan Luma,et al. Using Elliptic Curve Encryption and Decryption for Securing Audio Messages , 2015 .
[7] Yiping Cao,et al. Digital audio information hiding based on Arnold transformation and double random-phase encoding technique , 2012 .
[8] Dolendro Singh Laiphrakpam,et al. Medical image encryption based on improved ElGamal encryption technique , 2017 .
[9] Shashi B. Rana,et al. Development of modified AES algorithm for data security , 2016 .
[10] Kuru Ratnavelu,et al. An audio encryption based on synchronization of robust BAM FCNNs with time delays , 2018, Multimedia Tools and Applications.
[11] Zhiyong Cui,et al. Digital audio signal encryption with a virtual optics scheme , 2003 .
[12] Tariq Shah,et al. Digital audio signals encryption by Mobius transformation and Hénon map , 2019, Multimedia Systems.
[13] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[14] Osama S. Faragallah. Secure Audio Cryptosystem Using Hashed Image LSB watermarking and Encryption , 2018, Wirel. Pers. Commun..
[15] R. Velumani,et al. RETRACTED ARTICLE: IoT based Prudent Automatic Falls Detection for Elders by Analyzing Carrier State Information (CSI) Employing Wi-Fi Devices , 2020, Wirel. Pers. Commun..
[16] L. Washington. Elliptic Curves: Number Theory and Cryptography, Second Edition , 2008 .
[17] S. El-Rabaie,et al. Efficient audio cryptosystem based on chaotic maps and double random phase encoding , 2015, Int. J. Speech Technol..
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[19] S.A Vanstone. Next generation security for wireless: elliptic curve cryptography , 2003, Comput. Secur..
[20] Stefan Katzenbeisser,et al. A secure multidimensional point inclusion protocol , 2007, MM&Sec.
[21] Soumya Paul,et al. DNA Encoding and Channel Shuffling for Secured Encryption of Audio Data , 2019, Multimedia Tools and Applications.
[22] R. Schoof. Journal de Theorie des Nombres de Bordeaux 7 (1995), 219{254 , 2022 .
[23] S. Ramakrishnan,et al. Speech encryption using chaotic shift keying for secured speech communication , 2017, EURASIP J. Audio Speech Music. Process..
[24] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[25] Juliano B. Lima,et al. Audio encryption based on the cosine number transform , 2016, Multimedia Tools and Applications.
[26] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[27] J. Pollard,et al. Monte Carlo methods for index computation () , 1978 .
[28] Mariusz Dzwonkowski,et al. A New Quaternion-Based Encryption Method for DICOM Images , 2015, IEEE Transactions on Image Processing.