메뉴 건너뛰기




Volumn , Issue , 2006, Pages 221-223

Image encryption algorithm based on chaotic sequence

Author keywords

[No Author keywords available]

Indexed keywords

BOOLEAN FUNCTIONS; DIGITAL IMAGE STORAGE; ITERATIVE METHODS; MATRIX ALGEBRA; NUMBER THEORY; VIRTUAL REALITY;

EID: 46449106025     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICAT.2006.71     Document Type: Conference Paper
Times cited : (14)

References (6)
  • 1
    • 84950900200 scopus 로고
    • On the derivation of a chaotic encryption algorithm [J]
    • R A J Matthews. On the derivation of a chaotic encryption algorithm [J]. Cryptologia. 1989, 13(1): 29-42
    • (1989) Cryptologia , vol.13 , Issue.1 , pp. 29-42
    • Matthews, R.A.J.1
  • 2
    • 84893107930 scopus 로고
    • A secret cryptosystem by iterating a chaotic map [A]
    • Berlin: Springer-Verlag
    • T Habutsu, Y Nishio, I Sasase, et al. A secret cryptosystem by iterating a chaotic map [A]. Advances in Cryptology EURCRYPT'91[C]. Berlin: Springer-Verlag. 1991: 127-140.
    • (1991) Advances in Cryptology EURCRYPT'91[C] , pp. 127-140
    • Habutsu, T.1    Nishio, Y.2    Sasase, I.3
  • 3
    • 0010206983 scopus 로고
    • High Speed Encryption System and Method [P]
    • US Patent, 515, 365-588
    • M. E. Bianco, G. L. Mayhew. High Speed Encryption System and Method [P]. US Patent, 1994, 5(15): 365-588.
    • (1994)
    • Bianco, M.E.1    Mayhew, G.L.2
  • 5
    • 0034245407 scopus 로고    scopus 로고
    • Image encryption for secure Internet multimedia applications [J]
    • P P Dang, P M Chau. Image encryption for secure Internet multimedia applications [J]. IEEE Transactions on Consumer Electronics, 2000, 46(8): 395-403.
    • (2000) IEEE Transactions on Consumer Electronics , vol.46 , Issue.8 , pp. 395-403
    • Dang, P.P.1    Chau, P.M.2
  • 6
    • 0001601484 scopus 로고    scopus 로고
    • Digital Image Transformation and Information Hiding and Disguising Technology
    • In China, in Chinese
    • Ding Wei, Qi Dong-Xu. Digital Image Transformation and Information Hiding and Disguising Technology. Computer joumal (In China), 1998, 21(9): 838-843. (in Chinese)
    • (1998) Computer joumal , vol.21 , Issue.9 , pp. 838-843
    • Wei, D.1    Dong-Xu, Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.