Real-time image encryption using a low-complexity discrete 3D dual chaotic cipher
暂无分享,去创建一个
[1] Julyan H. E. Cartwright,et al. THE DYNAMICS OF RUNGE–KUTTA METHODS , 1992 .
[2] Guanrong Chen,et al. Breaking a chaos-based secure communication scheme designed by an improved modulation method , 2004, nlin/0411007.
[3] Samrat L. Sabat,et al. A fast chaotic block cipher for image encryption , 2014, Commun. Nonlinear Sci. Numer. Simul..
[4] Gonzalo Álvarez,et al. Cryptanalysis of a chaotic block cipher with external key and its improved version , 2006, ArXiv.
[5] S. Li,et al. On the security of a new image encryption scheme based on chaotic map lattices. , 2008, Chaos.
[6] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[7] A. Kanso,et al. A novel image encryption algorithm based on a 3D chaotic map , 2012 .
[8] Lequan Min,et al. A Generalized Synchronization Theorem for an Array of Differential Equations with Application to Secure Communication , 2005, Int. J. Bifurc. Chaos.
[9] Zhongmeng Zhao,et al. An efficient chaotic image encryption based on alternate circular S-boxes , 2014, Nonlinear Dynamics.
[10] Guanrong Chen,et al. On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.
[11] Vinod Patidar,et al. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption , 2011 .
[12] F. Christiansen,et al. Computing Lyapunov spectra with continuous Gram - Schmidt orthonormalization , 1996, chao-dyn/9611014.
[13] Hanping Hu,et al. Analyzing and improving a chaotic encryption method , 2004 .
[14] R. Eykholt,et al. Estimating the Lyapunov-exponent spectrum from short time series of low precision. , 1991, Physical review letters.
[15] Hongjun Liu,et al. Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..
[16] Michael Peter Kennedy,et al. Chaos shift keying : modulation and demodulation of a chaotic carrier using self-sychronizing chua"s circuits , 1993 .
[17] X. Niu,et al. A hybrid chaotic system and cyclic elliptic curve for image encryption , 2013 .
[18] Brown,et al. Computing the Lyapunov spectrum of a dynamical system from an observed time series. , 1991, Physical review. A, Atomic, molecular, and optical physics.
[19] A. Wolf,et al. Determining Lyapunov exponents from a time series , 1985 .
[20] Xiaoling Huang,et al. An efficient self-adaptive model for chaotic image encryption algorithm , 2014, Commun. Nonlinear Sci. Numer. Simul..
[21] E. Lorenz. Deterministic nonperiodic flow , 1963 .
[22] John C. Butcher,et al. A history of Runge-Kutta methods , 1996 .
[23] Louis M. Pecora,et al. Synchronizing chaotic circuits , 1991 .
[24] T. Aaron Gulliver,et al. A new 3D chaotic cipher for encrypting two data streams simultaneously , 2015, Nonlinear Dynamics.
[25] Chun-Mei Yang,et al. Cryptanalyzing chaotic secure communications using return maps , 1998 .
[26] Xin Zhang,et al. A new chaotic algorithm for image encryption , 2006 .
[27] Shujun Li,et al. Determination of the Parameters for a Lorenz System and Application to Break the Security of Two-channel Chaotic Cryptosystems , 2008 .
[28] Kazuyuki Aihara,et al. Dynamical Characteristics of Discretized Chaotic Permutations , 2002, Int. J. Bifurc. Chaos.
[29] Sattar Mirzakuchaki,et al. A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map , 2012, Signal Process..
[30] Ljupco Kocarev,et al. General approach for chaotic synchronization with applications to communication. , 1995, Physical review letters.
[31] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[32] Vinod Patidar,et al. Image encryption using chaotic logistic map , 2006, Image Vis. Comput..
[33] Mohamed I. Sobhy,et al. Secure Computer Communication using Chaotic Algorithms , 2000, Int. J. Bifurc. Chaos.
[34] Gonzalo Alvarez,et al. A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis , 2010, Communications in Nonlinear Science and Numerical Simulation.
[35] Borko Furht,et al. Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[36] Guanrong Chen,et al. On the security defects of an image encryption scheme , 2009, Image Vis. Comput..
[37] Hassan N. Noura,et al. An image encryption scheme based on irregularly decimated chaotic maps , 2014, Signal Process. Image Commun..
[38] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[39] Mohammad Reza Mosavi,et al. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process , 2012, Multimedia Tools and Applications.
[40] Yicong Zhou,et al. A new 1D chaotic system for image encryption , 2014, Signal Process..
[41] Kwok-Wo Wong,et al. A chaotic image encryption scheme owning temp-value feedback , 2013, Commun. Nonlinear Sci. Numer. Simul..
[42] S. Li,et al. Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.