Integration of Elliptical Cryptography with RSA and Steganography using Biometric Authentication
暂无分享,去创建一个
[1] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[2] S. Katzenbeisser,et al. A survey of steganographic techniques , .
[3] K. Gnana Sheela,et al. Analysis of elliptic curve scalar multiplication in secure communications , 2015, 2015 Global Conference on Communication Technologies (GCCT).
[4] Osama S. Faragallah,et al. An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.
[5] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[6] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[7] Canyan Zhu,et al. Image encryption algorithm based on chaotic mapping , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[8] Lifang Wu,et al. A novel key generation cryptosystem based on face features , 2010, IEEE 10th INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS.
[9] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[10] Ismail Amr Ismail,et al. A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps , 2010, Int. J. Netw. Secur..
[11] Manoj Prabhakar. Elliptic Curve Cryptography in Securing Networks by Mobile Authentication , 2013 .
[12] William Stallings,et al. Cryptography and network security , 1998 .
[13] Vivek Kapoor,et al. Elliptic curve cryptography , 2008, UBIQ.
[14] Mamta Juneja,et al. Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[15] Manali Dubal,et al. Achieving Authentication and Integrity using Elliptic Curve Cryptography Architecture , 2013 .
[17] Zulkarnain Md Ali,et al. A Novel Public Key Image Encryption Based on Elliptic Curves over Prime Group Field , 2013 .
[18] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[19] Cristian-Iulian Rincu,et al. Combining point operations for efficient elliptic curve cryptography scalar multiplication , 2014, 2014 10th International Conference on Communications (COMM).