메뉴 건너뛰기




Volumn 31, Issue 6, 2003, Pages 489-506

A reconfigurable logic-based processor for the SCAN image and video encryption algorithm

Author keywords

Block cipher; Cryptography; Image encryption; Reconfigurable logic

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; FIELD PROGRAMMABLE GATE ARRAYS; IMAGE PROCESSING; PROGRAM PROCESSORS; RANDOM ACCESS STORAGE; SOFTWARE ENGINEERING;

EID: 3543148897     PISSN: 08857458     EISSN: None     Source Type: Journal    
DOI: 10.1023/B:IJPP.0000004512.53221.ff     Document Type: Conference Paper
Times cited : (17)

References (26)
  • 1
    • 0000326312 scopus 로고
    • Picture data encryption using SCAN patterns
    • N. Bourbakis and C. Alexopoulos, Picture Data Encryption Using SCAN Patterns, Pattern Recogn., 25(6):576-581 (1992).
    • (1992) Pattern Recogn. , vol.25 , Issue.6 , pp. 576-581
    • Bourbakis, N.1    Alexopoulos, C.2
  • 3
    • 0000378191 scopus 로고    scopus 로고
    • Fast encryption of image data using chaotic kolmogorov flows
    • J. Scharinger, Fast Encryption of Image Data Using Chaotic Kolmogorov Flows, J. Electronics Imaging, 17(2):318-325 (1998).
    • (1998) J. Electronics Imaging , vol.17 , Issue.2 , pp. 318-325
    • Scharinger, J.1
  • 4
    • 0032045063 scopus 로고    scopus 로고
    • Large encrypting of binary images with higher security
    • L. Chang, Large Encrypting of Binary Images with Higher Security, Pattern Recogn. Lett., 19(5):461-168 (1998).
    • (1998) Pattern Recogn. Lett. , vol.19 , Issue.5 , pp. 461-1168
    • Chang, L.1
  • 5
    • 0031273788 scopus 로고    scopus 로고
    • Image compression and encryption using tree structures
    • X. Li, Image Compression and Encryption Using Tree Structures, Pattern Recogn. Lett., 18(11): 1253-1259 (1997).
    • (1997) Pattern Recogn. Lett. , vol.18 , Issue.11 , pp. 1253-1259
    • Li, X.1
  • 6
    • 0031222252 scopus 로고    scopus 로고
    • A linear quadtree compression scheme for image encryption
    • H. Chang and J. Liu, A Linear Quadtree Compression Scheme for Image Encryption, Signal Processing: Image Communication, 10(4):279-290 (1997).
    • (1997) Signal Processing: Image Communication , vol.10 , Issue.4 , pp. 279-290
    • Chang, H.1    Liu, J.2
  • 7
    • 0347808883 scopus 로고    scopus 로고
    • New approach to image encryption
    • April
    • T. Chuang and J. Lin, New Approach to Image Encryption, J. Electronic Imaging, 7(2):350-356 (April 1998).
    • (1998) J. Electronic Imaging , vol.7 , Issue.2 , pp. 350-356
    • Chuang, T.1    Lin, J.2
  • 8
    • 0001288179 scopus 로고    scopus 로고
    • A new multiresolution approach to still image encryption
    • T. Chuang and J. Lin, A New Multiresolution Approach to Still Image Encryption, Pattern Recogn. Image Analysis, 9(3):431-439 (1999).
    • (1999) Pattern Recogn. Image Analysis , vol.9 , Issue.3 , pp. 431-439
    • Chuang, T.1    Lin, J.2
  • 9
    • 0034777551 scopus 로고    scopus 로고
    • A hardware-based attack on the A5/1 stream cipher
    • München (October)
    • J. Keller, A Hardware-Based Attack on the A5/1 Stream Cipher, Proc. APC 2001, München, pp. 155-158 (October 2001).
    • (2001) Proc. APC 2001 , pp. 155-158
    • Keller, J.1
  • 10
    • 12344327931 scopus 로고    scopus 로고
    • Real time cryptanalysis of A5/1 on a PC
    • New York City (April 10-12)
    • A. Biryukov, Real Time Cryptanalysis of A5/1 on a PC, Fast Software Encryption Workshop 2000, New York City (April 10-12, 2000).
    • (2000) Fast Software Encryption Workshop 2000
    • Biryukov, A.1
  • 16
    • 0035869080 scopus 로고    scopus 로고
    • A hybrid system for real-time lossless image compression
    • G. Drost and N. Bourbakis, A Hybrid System for Real-Time Lossless Image Compression, Microprocess. Microsy. 25:9-31 (2001).
    • (2001) Microprocess. Microsy , vol.25 , pp. 9-31
    • Drost, G.1    Bourbakis, N.2
  • 19
    • 0033081875 scopus 로고    scopus 로고
    • A language for image processing: Formal modeling
    • N. Bourbakis and C. Alexopoulos, A Language for Image Processing: Formal Modeling, Pattern Recogn., 32(2):317-338 (1999).
    • (1999) Pattern Recogn. , vol.32 , Issue.2 , pp. 317-338
    • Bourbakis, N.1    Alexopoulos, C.2
  • 21
    • 84944872607 scopus 로고    scopus 로고
    • Two methods of rijndael implementation in reconfigurable logic
    • Lecture Notes in Computer Science, (2201)
    • V. Fischer and M. Drutarovsky, Two Methods of Rijndael Implementation in Reconfigurable Logic, CHES 2001, Lecture Notes in Computer Science, Vol. 2162, pp. 77-92 (2201).
    • CHES 2001 , vol.2162 , pp. 77-92
    • Fischer, V.1    Drutarovsky, M.2
  • 22
    • 0004455290 scopus 로고    scopus 로고
    • Fast DES implementations for FPGAs and its application to a universal key-search machine
    • Lecture Notes in Computer Science, Springer-Verlag (August)
    • J. Kaps and C. Paar, Fast DES Implementations for FPGAs and its Application to a Universal Key-Search Machine, 5th Annual Workshop on Selected Areas in Cryptography (SAC '98), Lecture Notes in Computer Science, Vol. 1556, Springer-Verlag (August 1998).
    • (1998) 5th Annual Workshop on Selected Areas in Cryptography (SAC '98) , vol.1556
    • Kaps, J.1    Paar, C.2
  • 25
    • 84942919757 scopus 로고    scopus 로고
    • Performance analysis of fixed, reconfigurable, and custom architecture for the SCAN image and video encryption algorithm
    • FCCM April 2003, Napa, California
    • C. Kachris, A. Dollas, and N. Bourbakis, Performance Analysis of Fixed, Reconfigurable, and Custom Architecture for the SCAN Image and Video Encryption Algorithm, Field-Programmable Custom Computing Machines, FCCM April 2003, Napa, California (2003).
    • (2003) Field-programmable Custom Computing Machines
    • Kachris, C.1    Dollas, A.2    Bourbakis, N.3
  • 26
    • 0042522792 scopus 로고    scopus 로고
    • SCAN based video compression-encryption-hiding for multimedia on demand
    • July-September
    • N. Bourbakis and A. Dollas, SCAN Based Video Compression-Encryption- Hiding for Multimedia on Demand, IEEE Multimedia, pp. 79-87 (July-September, 2003).
    • (2003) IEEE Multimedia , pp. 79-87
    • Bourbakis, N.1    Dollas, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.