Security in the speech cryptosystem based on blind sources separation
暂无分享,去创建一个
[1] Shiguo Lian,et al. Security Analysis of A Chaos-based Image Encryption Algorithm , 2005, ArXiv.
[2] Gonzalo Alvarez,et al. Security analysis of communication system based on the synchronization of different order chaotic systems , 2005, nlin/0506056.
[3] Yannick Deville,et al. Differential Fast Fixed-Point Algorithms for Underdetermined Instantaneous and Convolutive Partial Blind Source Separation , 2007, IEEE Transactions on Signal Processing.
[4] Hualou Liang,et al. A blind source separation based method for speech encryption , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[5] Rabab Kreidieh Ward,et al. Robust Image Watermarking Based on Multiscale Gradient Direction Quantization , 2011, IEEE Transactions on Information Forensics and Security.
[6] Sheng-He Sun,et al. Multipurpose image watermarking algorithm based on multistage vector quantization , 2005, IEEE Transactions on Image Processing.
[7] Hualou Liang,et al. A Fast Decryption Algorithm for BSS-Based Image Encryption , 2006, ISNN.
[8] Anil Kumar,et al. An extended secure data communication using blind source separation and HC-128 , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).
[9] Chun-Mei Yang,et al. Cryptanalyzing chaotic secure communications using return maps , 1998 .
[10] Zhi Zhou,et al. Halftone visual cryptography , 2006, IEEE Transactions on Image Processing.
[11] Anil Kumar,et al. An Improved Secure Data Communication Using Blind Source Separation and Chaos , 2009, 2009 11th IEEE International Symposium on Multimedia.
[12] Guanrong Chen,et al. Cryptanalyzing an Encryption Scheme Based on Blind Source Separation , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.
[13] Giovanni Di Crescenzo,et al. Halftone Visual Cryptography Via Error Diffusion , 2009, IEEE Transactions on Information Forensics and Security.
[14] A. Albagul,et al. Secure data communication using blind source separation , 2008, 2008 International Conference on Computer and Communication Engineering.
[15] Lahouari Ghouti,et al. Digital image watermarking using balanced multiwavelets , 2006, IEEE Transactions on Signal Processing.
[16] Guanrong Chen,et al. Cryptanalysis of an Encryption Scheme Based on Blind Source Separation , 2006, ArXiv.
[17] Ali Hassan,et al. Crypt analysis of two time pads in case of compressed speech , 2011, Comput. Electr. Eng..
[18] Hualou Liang,et al. Blind Source Separation-Based Encryption of Images and Speeches , 2005, ISNN.
[19] Zhenwei Shi,et al. Blind source separation of more sources than mixtures using sparse mixture models , 2005, Pattern Recognit. Lett..
[20] Lin Qiuhua,et al. Image cryptosystems based on blind source separation , 2003, International Conference on Neural Networks and Signal Processing, 2003. Proceedings of the 2003.
[21] Yong Wang,et al. Comments on, ''A blind source separation-based method for multiple images encryption" , 2011 .
[22] Scott T. Rickard,et al. A general framework for extending classic array processing techniques to the underdetermined blind source separation problem , 2007, 2007 9th International Symposium on Signal Processing and Its Applications.
[23] Takeshi Koshiba,et al. More on Security of Public-Key Cryptosystems Based on Chebyshev Polynomials , 2007, IEEE Transactions on Circuits and Systems II: Express Briefs.
[24] Adel Belouchrani,et al. A subspace-based method for speech encryption , 2010, 10th International Conference on Information Science, Signal Processing and their Applications (ISSPA 2010).
[25] Hualou Liang,et al. A blind source separation-based method for multiple images encryption , 2008, Image Vis. Comput..
[26] Daniel W. C. Ho,et al. Underdetermined blind source separation based on sparse representation , 2006, IEEE Transactions on Signal Processing.
[27] Nikolaos G. Bourbakis,et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks , 2008, Signal Process. Image Commun..
[28] Jiwu Huang,et al. Robust Image Watermarking Based on Multiband Wavelets and Empirical Mode Decomposition , 2007, IEEE Transactions on Image Processing.
[29] Qiu-Hua Lin,et al. Fast decryption utilizing correlation calculation for BSS-based speech encryption system , 2010, 2010 Sixth International Conference on Natural Computation.
[30] Scott Rickard,et al. Blind separation of speech mixtures via time-frequency masking , 2004, IEEE Transactions on Signal Processing.
[31] Özgür Yilmaz,et al. Blind separation of disjoint orthogonal signals: demixing N sources from 2 mixtures , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[32] Yiwei Wang,et al. A wavelet-based watermarking algorithm for ownership verification of digital images , 2002, IEEE Trans. Image Process..
[33] R. Gil-Pita,et al. Energy-weighted Mean Shift algorithm for speech source separation , 2011, 2011 IEEE Statistical Signal Processing Workshop (SSP).