메뉴 건너뛰기




Volumn 5, Issue 3, 2006, Pages 516-519

Image encryption using genetic algorithm

Author keywords

Crossover; Mutation; Substitution; Transposition

Indexed keywords

CROSSOVER; MUTATION; SUBSTITUTION; TRANSPOSITION;

EID: 33749632318     PISSN: 18125638     EISSN: 18125646     Source Type: Journal    
DOI: 10.3923/itj.2006.516.519     Document Type: Article
Times cited : (26)

References (7)
  • 2
    • 0038263344 scopus 로고    scopus 로고
    • Modeling GA performance for control parameter optimization, book title
    • Morgan Kaufmann Publisher, Las Vegas, Nevada, USA, Internet Paper
    • Cicirello, V.A. and S.F. Smith, 2000. Modeling GA Performance for Control Parameter Optimization, book title. Proceedings of the Genetic and Evolutionary Computation Conference ({GECCO}-2000), Morgan Kaufmann Publisher, Las Vegas, Nevada, USA, Internet Paper, URL: http://www.citeseer.nj.nec.com/ cicirello00modeling.html, pp: 235-242.
    • (2000) Proceedings of the Genetic and Evolutionary Computation Conference ({GECCO}-2000) , pp. 235-242
    • Cicirello, V.A.1    Smith, S.F.2
  • 3
    • 0003882343 scopus 로고
    • Genetic programming: On programming of computers by means of natural selection
    • MIT Press, Cambridge, Massachusetts, London England
    • Koza, Jr., 1992. Genetic Programming: On Programming of Computers by Means of Natural Selection. Bradford book. MIT Press, Cambridge, Massachusetts, London England.
    • (1992) Bradford Book
    • Koza, Jr.1
  • 4
    • 0036296858 scopus 로고    scopus 로고
    • Cryptanalysis of a chaotic image encryption method
    • The 2002 IEEE Intl. Symp. on Circuits and Systems (ISCAS 2002), Scottsdale, Arizona
    • Li, S. and X. Zheng, 2002a. Cryptanalysis of a chaotic image encryption method. The 2002 IEEE Intl. Symp. on Circuits and Systems (ISCAS 2002), Scottsdale, Arizona, Proceedings of ISCAS, 2: 708-711.
    • (2002) Proceedings of ISCAS , vol.2 , pp. 708-711
    • Li, S.1    Zheng, X.2
  • 5
    • 0036453480 scopus 로고    scopus 로고
    • On the security of an image encryption method
    • The 2002 IEEE Intl. Conf. Image Processing (ICIP 2002), Rochester, New York
    • Li, S. and X. Zheng, 2002b. On the security of an image encryption method. The 2002 IEEE Intl. Conf. Image Processing (ICIP 2002), Rochester, New York, Proceedings of ICIP, 2: 925-928.
    • (2002) Proceedings of ICIP , vol.2 , pp. 925-928
    • Li, S.1    Zheng, X.2
  • 6
    • 84950817396 scopus 로고
    • The use of genetic algorithms in cryptanalysis
    • Robert, A. and J. Mathews, 1993. The use of genetic algorithms in cryptanalysis. Cryptologia, 17: 187-201.
    • (1993) Cryptologia , vol.17 , pp. 187-201
    • Robert, A.1    Mathews, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.