Biometric Authentication Using Multilevel Encryption And Decryption
暂无分享,去创建一个
[1] Zhang Han,et al. IMAGE ENCRYPTION TECHNIQUES USING CHAOTIC SCHEMES : A REVIEW , 2010 .
[2] C. E. Puente,et al. The Essence of Chaos , 1995 .
[3] L. Chua,et al. CLARIFYING CHAOS: EXAMPLES AND COUNTEREXAMPLES , 1996 .
[4] Ying Huang,et al. Fractional wave packet transform , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.
[5] Chin-Chen Chang,et al. A new encryption algorithm for image cryptosystems , 2001, J. Syst. Softw..
[6] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[7] Delong Cui. A Novel Fingerprint Encryption Algorithm Based on Chaotic System and Fractional Fourier Transform , 2010, 2010 International Conference on Machine Vision and Human-machine Interface.
[8] B. N. Chatterji,et al. Secure Image encryption through key hashing and wavelet transform techniques , 2012 .
[9] Xinghuo Yu,et al. Fingerprint images encryption via multi-scroll chaotic attractors , 2007, Appl. Math. Comput..
[10] Roland Schmitz,et al. Use of chaotic dynamical systems in cryptography , 2001, J. Frankl. Inst..
[11] Xin Zhang,et al. A new chaotic algorithm for image encryption , 2006 .
[12] Linfei Chen,et al. Image encryption with fractional wavelet packet method , 2008 .
[13] Ljupco Kocarev,et al. From chaotic maps to encryption schemes , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).
[14] Abhinav Srivastava. A survey report on Different Techniques of Image Encryption , 2012 .
[15] A. Akhavan,et al. A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .
[16] X. Liao,et al. An image encryption approach based on chaotic maps , 2005 .
[17] Ganapati Panda,et al. Image Encryption Using Advanced Hill Cipher Algorithm , 2009 .
[18] Payal Sharma,et al. DigitalImage Encryption Techniques: A Review , 2012 .
[19] W. Tang,et al. A fast image encryption system based on chaotic maps with finite precision representation , 2007 .
[20] Gaurav Bhatnagar,et al. Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission , 2012, IEEE Transactions on Instrumentation and Measurement.
[21] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[22] Muhammad Khurram Khan,et al. Challenge-response-based biometric image scrambling for secure personal identification , 2011, Future Gener. Comput. Syst..
[23] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .