暂无分享,去创建一个
Sos S. Agaian | Yue Wu | Joseph P. Noonan | S. Agaian | J. Noonan | P. Natarajan | Yue Wu | Yuehua Wu | Yicong Zhou | George Saveriades
[1] Wei Zhang,et al. A chaos-based symmetric image encryption scheme using a bit-level permutation , 2011, Inf. Sci..
[2] Zengqiang Chen,et al. A new image encryption algorithm based on hyper-chaos , 2008 .
[3] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[4] Maliha S. Nash,et al. Handbook of Parametric and Nonparametric Statistical Procedures , 2001, Technometrics.
[5] L. Afflerbach,et al. Criteria for the assessment of random number generators , 1990 .
[6] Chun-Liang Lin,et al. Personalized information encryption using ECG signals with chaotic functions , 2012, Inf. Sci..
[7] N. Bourbakis,et al. SCAN-Based Compression-Encryption-Hiding for Video on Demand , 2003, IEEE Multim..
[8] A. Rukhin,et al. Statistical Testing of Random Number Generators , 1999 .
[9] Anil Kumar,et al. Extended substitution–diffusion based image cipher using chaotic standard map , 2011 .
[10] Qing Zhou,et al. A novel image encryption algorithm based on self-adaptive wave transmission , 2010, Signal Process..
[11] C. Chui,et al. A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .
[12] Bengt J Allen,et al. Statistics: Concepts and Applications for Science.ByDavid LeBlanc.Sudbury (Massachusetts): Jones and Bartlett Publishers. $89.95 (two‐volume set). xvii + 382 p; ill.; index. ISBN: 0–7637–4699–1. 2004.Workbook to AccompanyStatistics: Concepts and Applications for Science.ByDavid LeBlanc.Sudbury (Mass , 2004 .
[13] Ross Ihaka,et al. Cryptographic Randomness from Air Turbulence in Disk Drives , 1994, CRYPTO.
[14] Bruce Schneier,et al. Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.
[15] Samarjit Kar,et al. Cross-entropy measure of uncertain variables , 2012, Inf. Sci..
[16] Qiang Zhang,et al. Image encryption using DNA addition combining with chaotic maps , 2010, Math. Comput. Model..
[17] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[18] J. E. Glynn,et al. Numerical Recipes: The Art of Scientific Computing , 1989 .
[19] Amir Akhavan,et al. A novel scheme for image encryption based on 2D piecewise chaotic maps , 2010 .
[20] W. Tang,et al. A fast image encryption system based on chaotic maps with finite precision representation , 2007 .
[21] Vasilios Katos. A randomness test for block ciphers , 2005, Appl. Math. Comput..
[22] Du Zhang,et al. Image Encryption and Chaotic Cellular Neural Network , 2009 .
[23] Sos S. Agaian,et al. Image encryption using the Sudoku matrix , 2010, Defense + Commercial Sensing.
[24] Xiongjun Li,et al. A New Measure of Image Scrambling Degree Based on Grey Level Difference and Information Entropy , 2008, 2008 International Conference on Computational Intelligence and Security.
[25] Luc Devroye,et al. The computer generation of poisson random variables , 1981, Computing.
[26] Yong Wang,et al. A new chaos-based fast image encryption algorithm , 2011, Appl. Soft Comput..
[27] Joos Vandewalle,et al. Cryptanalysis of SOBER-t32 , 2003, FSE.
[28] Paul C. Kocher,et al. The intel random number generator , 1999 .
[29] I. Shevtsova,et al. An improvement of the Berry–Esseen inequality with applications to Poisson and mixed Poisson random sums , 2009, 0912.2795.
[30] Albert Y. Zomaya,et al. Local measures of information storage in complex distributed computation , 2012, Inf. Sci..
[31] Joseph L. Leva. A fast normal random number generator , 1992, TOMS.
[32] C. S. Davis. The computer generation of multinomial random variates , 1993 .
[33] Sos S. Agaian,et al. Image encryption using P-Fibonacci transform and decomposition , 2012 .
[34] Weiwu Fang. The characterization of a measure of information discrepancy , 2000, Inf. Sci..
[35] Moti Yung,et al. A block cipher based pseudo random number generator secure against side-channel key recovery , 2008, ASIACCS '08.
[36] Bruce Schneier,et al. Cryptanalysis of the cellular message encryption algorithm , 1997 .
[37] F. James. A Review of Pseudorandom Number Generators , 1990 .
[38] X. Liao,et al. An image encryption approach based on chaotic maps , 2005 .
[39] LI Luo-luo. A New Measurement for Image Encryption Effect , 2005 .
[40] Andriy V. Miranskyy,et al. Using entropy measures for comparison of software traces , 2010, Inf. Sci..
[41] Nikolaos G. Bourbakis,et al. Picture data encryption using scan patterns , 1992, Pattern Recognit..
[42] Prem Nath Arora. On the Shannon measure of entropy , 1981, Inf. Sci..
[43] Krzysztof Wesolowski. Introduction to Digital Communication Systems , 2009 .
[44] Bruce Schneier,et al. The Twofish encryption algorithm: a 128-bit block cipher , 1999 .
[45] R. C. Kao,et al. An Identity for the Sum of Multinomial Coefficients , 1957 .
[46] Chuan Zhou,et al. A Color Image Encryption Algorithm Based on Magic Cube Transformation and Modular Arithmetic Operation , 2005, PCM.
[47] Rastislav Lukac,et al. Efficient encryption of wavelet-based coded color images , 2005, Pattern Recognit..
[48] Xiaojun Tong,et al. Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator , 2009, Signal Process..
[49] Roger Sauter,et al. Introduction to Statistics and Data Analysis , 2002, Technometrics.
[50] S. Agaian,et al. NPCR and UACI Randomness Tests for Image Encryption , 2011 .
[51] Kwok-Wo Wong,et al. Baptista-type chaotic cryptosystems: problems and countermeasures , 2004, Physics Letters A.
[52] Benny Pinkas,et al. Cryptanalysis of the random number generator of the Windows operating system , 2009, TSEC.
[53] Guanrong Chen,et al. A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps , 2004, Int. J. Bifurc. Chaos.
[54] Xiaojun Tong,et al. Image encryption with compound chaotic sequence cipher shifting dynamically , 2008, Image Vis. Comput..
[55] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[56] N. Bourbakis,et al. Data-image-video encryption , 2004, IEEE Potentials.
[57] A. Akhavan,et al. A novel algorithm for image encryption based on mixture of chaotic maps , 2008 .
[58] Gonzalo Alvarez,et al. Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations , 2006, nlin/0611017.
[59] Vinod Patidar,et al. Image encryption using chaotic logistic map , 2006, Image Vis. Comput..