Payback of Image Encryption Techniques: A Quantitative Investigation
暂无分享,去创建一个
[1] Amarjeet Poonia,et al. Performance analysis of Gabor 2D PCA feature extraction for gender identification using face , 2017, 2017 2nd International Conference on Telecommunication and Networks (TEL-NET).
[2] Bibhudendra Acharya,et al. Image Encryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm , 2008 .
[3] S Rakesh,et al. Image Encryption using Block Based Uniform Scrambling and Chaotic Logistic Mapping , 2012 .
[4] Qu Wang,et al. Double image encryption based on phase-amplitude hybrid encoding and iterative phase encoding in fractional Fourier transform domains , 2013 .
[5] A. K. Gulve,et al. A Comparative Performance Analysis of an Image Encryption Technique using Extended Hill Cipher , 2014 .
[6] Nikolaos G. Bourbakis,et al. Picture data encryption using scan patterns , 1992, Pattern Recognit..
[7] Neha Singla,et al. Image Encryption Using Block-Based Transformation Algorithm , 2014 .
[8] N. Sethi,et al. Comparative Image Encryption Method Analysis Using New Transformed - Mapped Technique , 2013 .
[9] Nikolaos G. Bourbakis,et al. Image encryption method using a class of fractals , 1995, J. Electronic Imaging.
[10] Nanrun Zhou,et al. Color Image Encryption Algorithm Combining Compressive Sensing with Arnold Transform , 2013, J. Comput..
[11] Manish Mishra,et al. Image encryption technique based on chaotic system and hash function , 2014, Proceedings of IEEE International Conference on Computer Communication and Systems ICCCS14.
[12] Savina Bansal,et al. Steganography and classification of image steganography techniques , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).
[13] Mohamed M. Fouad,et al. Securing Image Transmission Using In- Compression Encryption Technique , 2010 .
[14] Xingyuan Wang,et al. A color image encryption with heterogeneous bit-permutation and correlated chaos , 2015 .
[15] Andreas Uhl,et al. SELECTIVE BITPLANE ENCRYPTION FOR SECURE TRANSMISSION OF IMAGE DATA IN MOBILE ENVIRONMENTS , 2002 .
[16] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[17] C. K. Huang,et al. Hybrid image encryption using multi-chaos-system , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).
[18] Xiaoyan Wang,et al. Image Encryption Algorithm Based on a Novel Improper Fractional-Order Attractor and a Wavelet Function Map , 2017, J. Electr. Comput. Eng..
[19] S. Agaian,et al. NPCR and UACI Randomness Tests for Image Encryption , 2011 .
[20] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[21] Komal Patel,et al. Image Encryption Using Different Techniques: A Review , 2011 .
[22] Lin Teng,et al. A novel colour image encryption algorithm based on chaos , 2012, Signal Process..
[23] Marc Van Droogenbroeck,et al. Techniques for a selective encryption of uncompressed and compressed images , 2002 .
[24] M. A. Mokhtar,et al. Design of image encryption algorithm based on different chaotic mapping , 2017, 2017 34th National Radio Science Conference (NRSC).
[25] Aman Jantan,et al. Image Encryption Using Block-Based Transformation Algorithm , 2008 .
[26] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[27] Josef Scharinger. Fast encryption of image data using chaotic Kolmogorov flows , 1998, J. Electronic Imaging.
[28] Jian Zhang,et al. Image Encryption Algorithm Based on DNA Encoding and Chaotic Maps , 2014 .
[29] P. S. Avadhani,et al. Permutation based Image Encryption Technique , 2011 .
[30] Charles Schwartz. A New Graphical Method for Encryption of Computer Data , 1991, Cryptologia.
[31] Quist-Aphetsi Kester,et al. A cryptographic Image Encryption technique based on the RGB PIXEL shuffling , 2013 .