-
1
-
-
0036814427
-
Image Encryption Techniques: A Survey
-
Oct
-
Li Chang-Gang, Han Zheng-Zhi, and Zhang Hao-Ran, "Image Encryption Techniques: A Survey", Journal of Computer Research And Development, Vol 39, No. 10, pp. 1317-1324, Oct. 2002.
-
(2002)
Journal of Computer Research And Development
, vol.39
, Issue.10
, pp. 1317-1324
-
-
Chang-Gang, L.1
Zheng-Zhi, H.2
Hao-Ran, Z.3
-
2
-
-
0034444913
-
A Novel Digital Hiding Technology Based on Tangram and Conways Game
-
Sept
-
Wei Ding, Wei-qi Yan, and Dong-xu Qi, "A Novel Digital Hiding Technology Based on Tangram and Conways Game", Proceeding of 2000 International Conference on Image Processing, Vol 1, pp. 601-604, Sept. 2000.
-
(2000)
Proceeding of 2000 International Conference on Image Processing
, vol.1
, pp. 601-604
-
-
Ding, W.1
Yan, W.2
Qi, D.3
-
3
-
-
33947239330
-
Digital Image Scrambling Based on the Baker's Transformation
-
Feb
-
Zhao Xue-feng, "Digital Image Scrambling Based on the Baker's Transformation", Journal of Northwest Normal University (Natural Science), Vol 39, No. 2, pp. 26-29, Feb. 2003.
-
(2003)
Journal of Northwest Normal University (Natural Science)
, vol.39
, Issue.2
, pp. 26-29
-
-
Xue-feng, Z.1
-
4
-
-
33947276772
-
Magic Cube Transformation and Its Application in Digital Image Encryption
-
Nov
-
Bao Guan-jun, Ji Shi-ming, and Shen Jian-bin, "Magic Cube Transformation and Its Application in Digital Image Encryption", Computer Applications, Vol 22, No. 11, pp. 23-25, Nov. 2002.
-
(2002)
Computer Applications
, vol.22
, Issue.11
, pp. 23-25
-
-
Guan-jun, B.1
Shi-ming, J.2
Jian-bin, S.3
-
5
-
-
15944412997
-
An Image Scrambling and Encryption Algorithm Based on Affine Transformation
-
June
-
Zhu Guibin, Cao Changxiu, Hu Zhongyu, et al., "An Image Scrambling and Encryption Algorithm Based on Affine Transformation", Journal of Computer-Aided Design & Computer Graphics, Vol 15, No. 6, pp. 711-715, June. 2003.
-
(2003)
Journal of Computer-Aided Design & Computer Graphics
, vol.15
, Issue.6
, pp. 711-715
-
-
Guibin, Z.1
Changxiu, C.2
Zhongyu, H.3
-
6
-
-
0031351370
-
Image Encryption Based on Chaotic Maps
-
Man, and Cybernetics, pp
-
Jiri Fridrich, "Image Encryption Based on Chaotic Maps", Proceeing of IEEE Conference On Systems, Man, and Cybernetics, pp. 1105-1110, 1997.
-
(1997)
Proceeing of IEEE Conference On Systems
, pp. 1105-1110
-
-
Fridrich, J.1
-
7
-
-
0033681472
-
A New Chaotic Key-Based Design for Image Encryption and Decryption
-
May
-
Jui-Cheng Yen, and Jiun-In Guo, "A New Chaotic Key-Based Design for Image Encryption and Decryption", IEEE International Symposium on ISCAS 2000, Geneva, pp. IV-49-IV-52, May. 2000.
-
(2000)
IEEE International Symposium on ISCAS 2000, Geneva, pp. IV-49-IV-52
-
-
Yen, J.1
Guo, J.2
-
8
-
-
0034843157
-
Chaotic Algorithms for Data Encryption
-
May
-
M.I.Sobhy, and A.R.Shehata, "Chaotic Algorithms for Data Encryption", IEEE Proceeding of ICASSP 2001, Vol 2, pp. 997-1000, May. 2001.
-
(2001)
IEEE Proceeding of ICASSP 2001
, vol.2
, pp. 997-1000
-
-
Sobhy, M.I.1
Shehata, A.R.2
-
9
-
-
0037746008
-
-
Mazleena Sallen, Subariah Ibrahim, and Ismail Fauzi Isnin, Enhanced Chaotic Image Encryption Algorithm Based on Vaker's Map, IEEE Proceedings of ISCAS 2003, 2, pp. II-508-II-511, May. 2003.
-
Mazleena Sallen, Subariah Ibrahim, and Ismail Fauzi Isnin, "Enhanced Chaotic Image Encryption Algorithm Based on Vaker's Map", IEEE Proceedings of ISCAS 2003, Vol 2, pp. II-508-II-511, May. 2003.
-
-
-
-
10
-
-
24944572787
-
-
Shaojiang Deng, Linhua Zhang, and Di Xiao, Image Encryption Scheme Based on Chaotic Neural System, J. Wang, X. Liao, and Z. Yi (Eds.): ISNN 2005, LNCS 3497, pp. 868-872, 2005.
-
Shaojiang Deng, Linhua Zhang, and Di Xiao, "Image Encryption Scheme Based on Chaotic Neural System", J. Wang, X. Liao, and Z. Yi (Eds.): ISNN 2005, LNCS 3497, pp. 868-872, 2005.
-
-
-
-
11
-
-
11244328432
-
The Spatial-Domain Encryption of Digital Images Based on High-Dimension Chaotic System
-
Singapore, pp, December
-
Wang Ying, Zheng DeLing, Ju Lei, et al., "The Spatial-Domain Encryption of Digital Images Based on High-Dimension Chaotic System", Proceeding of 2004 IEEE Conference on Cybernetics and Intelligent Systems, Singapore, pp. 1172-1176, December. 2004.
-
(2004)
Proceeding of 2004 IEEE Conference on Cybernetics and Intelligent Systems
, pp. 1172-1176
-
-
Ying, W.1
DeLing, Z.2
Lei, J.3
-
12
-
-
0034856253
-
Methods of Attacking Chaotic Encryption and Countermeasures
-
May
-
M.I.Sobhy, and A.R.Shehata, "Methods of Attacking Chaotic Encryption and Countermeasures", IEEE Proceeding of ICASSP 2001, Vol 2, pp. 1001-1004, May. 2001.
-
(2001)
IEEE Proceeding of ICASSP 2001
, vol.2
, pp. 1001-1004
-
-
Sobhy, M.I.1
Shehata, A.R.2
-
13
-
-
33745799480
-
The Application of Chaotic Maps in Image Encryption
-
June
-
Jiancheng Zou, ChangZhen Xiong, Dongxu Qi, et al., "The Application of Chaotic Maps in Image Encryption", IEEE Proceedings of on NEWCAS 2005, pp. 331-334, June. 2005.
-
(2005)
IEEE Proceedings of on NEWCAS 2005
, pp. 331-334
-
-
Zou, J.1
Xiong, C.2
Qi, D.3
-
14
-
-
33947221989
-
-
http://sipi.usc.edu/database/.
-
-
-
|