A novel image encryption algorithm based on a 3D chaotic map
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Eli Biham,et al. Cryptanalysis of the Chaotic-Map Cryptosystem Suggested at EUROCRYPT'91 , 1991, EUROCRYPT.
[3] Wentian Li,et al. On the Relationship between Complexity and Entropy for Markov Chains and Regular Languages , 1991, Complex Syst..
[4] Iwao Sasase,et al. A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Zbigniew Kotulski,et al. Discrete chaotic cryptography , 1997 .
[7] M. Baptista. Cryptography with chaos , 1998 .
[8] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[9] Guanrong Chen,et al. From Chaos To Order Methodologies, Perspectives and Applications , 1998 .
[10] Kuo-Liang Chung,et al. Large encrypting binary images with higher security , 1998, Pattern Recognit. Lett..
[11] Josef Scharinger. Fast encryption of image data using chaotic Kolmogorov flows , 1998, J. Electronic Imaging.
[12] Gonzalo Alvarez,et al. Chaotic cryptosystems , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[13] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[14] Xuanqin Mou,et al. Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.
[15] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .
[16] Chin-Chen Chang,et al. A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..
[17] Jiun-In Guo,et al. Design of a New Cryptography System , 2002, IEEE Pacific Rim Conference on Multimedia.
[18] Shujun Li,et al. Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[19] K. Yano,et al. Image Encryption Scheme Based on a Truncated Baker Tranformation , 2002 .
[20] Chin-Chen Chang,et al. Cryptanalysis of an encryption scheme for binary images , 2002, Pattern Recognit. Lett..
[21] Shujun Li,et al. On the security of an image encryption method , 2002, Proceedings. International Conference on Image Processing.
[22] Shujun Li,et al. Analyses and New Designs of Digital Chaotic Ciphers , 2003 .
[23] Hun-Chen Chen,et al. A new cryptography system and its VLSI realization , 2003, Journal of systems architecture.
[24] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[25] Guanrong Chen,et al. Chaos-Based Encryption for Digital Images and Videos , 2004 .
[26] Nikolaos G. Bourbakis,et al. Image and video encryption using SCAN patterns , 2004, Pattern Recognit..
[27] Guanrong Chen,et al. A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.
[28] Guanrong Chen,et al. Cryptanalysis of RCES/RSES Image Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..
[29] Z. Guan,et al. Chaos-based image encryption algorithm ✩ , 2005 .
[30] Gang Chen,et al. Cryptanalysis of a New Signal Security System for Multimedia Data Transmission , 2005, EURASIP J. Adv. Signal Process..
[31] Guanrong Chen,et al. Chaos-Based Image Encryption , 2005 .
[32] Kai Wang,et al. On the security of 3D Cat map based symmetric image encryption scheme , 2005 .
[33] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.
[34] Bart Preneel,et al. Cryptanalysis of the Two-Dimensional Circulation Encryption Algorithm , 2005, EURASIP J. Adv. Signal Process..
[35] Shujun Li,et al. On the security of the Yen-Guo's domino signal encryption algorithm (DSEA) , 2005, J. Syst. Softw..
[36] A. Pisarchik,et al. Encryption and decryption of images with chaotic map lattices. , 2006, Chaos.
[37] Min Wu,et al. A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.
[38] Amir Akhavan,et al. Chaotic Cryptographic Scheme Based on Composition Maps , 2006, Int. J. Bifurc. Chaos.
[39] Zengqiang Chen,et al. A new image encryption algorithm based on hyper-chaos , 2008 .
[40] Guanrong Chen,et al. On the security of a class of image encryption schemes , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[41] Xin Zhang,et al. A new chaotic algorithm for image encryption , 2006 .
[42] Rhouma Rhouma,et al. Cryptanalysis of a new image encryption algorithm based on hyper-chaos , 2008 .
[43] Tao Xiang,et al. Parallel image encryption algorithm based on discretized chaotic map , 2008 .
[44] Rhouma Rhouma,et al. Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem , 2008 .
[45] S. Li,et al. On the security of a new image encryption scheme based on chaotic map lattices. , 2008, Chaos.
[46] A. Kanso,et al. Logistic chaotic maps for binary numbers generations , 2009 .
[47] S. Lian,et al. Efficient image or video encryption based on spatiotemporal chaos system , 2009 .
[48] S. Li,et al. Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption , 2009 .
[49] Ali Kanso,et al. Irregularly Decimated Chaotic Map(S) for Binary Digits Generations , 2009, Int. J. Bifurc. Chaos.
[50] Vinod Patidar,et al. A new substitution–diffusion based image cipher using chaotic standard and logistic maps , 2009 .
[51] Zbigniew Kotulski,et al. On improved image encryption scheme based on chaotic map lattices , 2009 .
[52] Wolfgang A. Halang,et al. Cryptanalysis of an image encryption scheme based on a compound chaotic sequence , 2007, Image Vis. Comput..
[53] Safya Belghith,et al. Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .
[54] Kwok-Tung Lo,et al. Breaking a Chaotic Cryptographic Scheme Based on Composition Maps , 2009, Int. J. Bifurc. Chaos.
[55] Ahmed A. Abd El-Latif,et al. A chaotic block cipher algorithm for image cryptosystems , 2010 .
[56] Olcay Taner Yildiz,et al. Cryptanalysis of Fridrich's Chaotic Image Encryption , 2010, Int. J. Bifurc. Chaos.
[57] D. Chattopadhyay,et al. Robust Chaotic Image Encryption based on Perturbation Technique , 2011 .
[58] Ali Kanso,et al. Self-shrinking chaotic stream ciphers , 2011 .
[59] Allan G. Bluman. Elementary Statistics: A Step By Step Approach , 1980 .