A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata
暂无分享,去创建一个
[1] Willi Meier,et al. Analysis of Pseudo Random Sequence Generated by Cellular Automata , 1991, EUROCRYPT.
[2] Ángel Martín del Rey,et al. Wolfram cellular auto mata and their cryptographic use as pseudorandom bit generators , 2003 .
[3] Ramón Alonso-Sanz,et al. Reversible cellular automata with memory: two-dimensional patterns from a single site seed , 2003 .
[4] Douglas R. Stinson,et al. Cryptography: Theory and Practice,Second Edition , 2002 .
[5] Ángel Martín del Rey,et al. Encryption of Images with 2-dimensional Cellular Automata , 2002 .
[6] N. Margolus,et al. Invertible cellular automata: a review , 1991 .
[7] Alfredo De Santis,et al. Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.
[8] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[9] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[10] S. Wolfram. Random sequence generation by cellular automata , 1986 .
[11] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[12] Douglas R. Stinson,et al. An explication of secret sharing schemes , 1992, Des. Codes Cryptogr..
[13] Marco Tomassini,et al. Cryptography with cellular automata , 2001, Appl. Soft Comput..
[14] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[15] Donald W. Davies,et al. Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.
[16] Adi Shamir,et al. How to share a secret , 1979, CACM.
[17] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[18] Parimal Pal Chaudhuri,et al. Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.
[19] Lakhmi C. Jain,et al. Knowledge-Based Intelligent Information and Engineering Systems , 2004, Lecture Notes in Computer Science.
[20] Chin-Chen Chang,et al. An image intellectual property protection scheme for gray-level images using visual secret sharing strategy , 2002, Pattern Recognit. Lett..
[21] Gonzalo Álvarez,et al. Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata , 2003, KES.
[22] Chin-Chen Chang,et al. Sharing Secret Omages using Shadow Codebooks , 1998, Inf. Sci..
[23] A. Beimel,et al. Lower bounds for monotone span programs , 2005, computational complexity.
[24] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[25] Chin-Chen Chang,et al. Sharing multiple secrets in digital images , 2002, J. Syst. Softw..
[26] Jon C. Muzio,et al. An Explicit Similarity Transform between Cellular Automata and LFSR Matrices , 1998 .