Temporal Ordered Image Encryption
暂无分享,去创建一个
Xiaoyi Zhou | Wencai Du | Miltos Petridis | Jixin Ma | M. Petridis | W.-C. Du | Xiaoyi Zhou | Jixin Ma
[1] Karel Vlcek,et al. Improving Chaos Image Encryption Speed , 2009 .
[2] Kwok-Wo Wong,et al. A fast image encryption and authentication scheme based on chaotic maps , 2010 .
[3] Seymour Lipschutz,et al. Schaum's outline of theory and problems of set theory and related topics , 1964 .
[4] Antony Galton,et al. A Critical Examination of Allen's Theory of Action and Time , 1990, Artif. Intell..
[5] James F. Allen. Towards a General Theory of Action and Time , 1984, Artif. Intell..
[6] D. McDermott. A Temporal Logic for Reasoning About Processes and Plans , 1982, Cogn. Sci..
[7] Ganapati Panda,et al. Image Encryption Using Advanced Hill Cipher Algorithm , 2009 .
[8] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[10] Bertram C. Bruce. A Model for Temporal References and Its Application in a Question Answering Program , 1972, Artif. Intell..
[11] P. Vanbeek. Reasoning about qualitative temporal information , 1992 .
[12] Aman Jantan,et al. Image Encryption Using Block-Based Transformation Algorithm , 2008 .
[13] Brian Knight,et al. A General Temporal Theory , 1994, Comput. J..
[14] X. Liao,et al. An image encryption approach based on chaotic maps , 2005 .
[15] Guanrong Chen,et al. A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.
[16] Brian Knight,et al. Representing The Dividing Instant , 2003, Comput. J..
[17] Shailendra N. Kulkarni,et al. A Robust Image Encryption Technique Based on Random Vector , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.
[18] Patrick J. Hayes,et al. Moments and points in an interval‐based temporal logic , 1989, Comput. Intell..
[19] Z. Guan,et al. Chaos-based image encryption algorithm ✩ , 2005 .
[20] Eamonn J. Keogh,et al. Detecting time series motifs under uniform scaling , 2007, KDD '07.
[21] T. Bata,et al. Improving Chaos Image Encryption Speed , 2009 .
[22] Ramón Rodríguez-Vera,et al. Image encryption based on phase encoding by means of a fringe pattern and computational algorithms , 2006 .
[23] S. R. Mahadeva Prasanna,et al. A Partial Image Encryption Method with Pseudo Random Sequences , 2006, ICISS.
[24] Yang-Sae Moon,et al. General match: a subsequence matching method in time-series databases based on generalized windows , 2002, SIGMOD '02.
[25] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[26] Guoxing Zhao,et al. An Ontological Characterization of Time-Series and State-Sequences for Data Mining , 2008, 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery.
[27] Jiawei Han,et al. Mining Approximate Top-K Subspace Anomalies in Multi-Dimensional Time-Series Data , 2007, VLDB.
[28] Yoav Shoham,et al. Temporal Logics in AI: Semantical and Ontological Considerations , 1987, Artif. Intell..
[29] Drew McDermott,et al. A Temporal Logic for Reasoning About Processes and Plans , 1982, Cogn. Sci..