-
2
-
-
33845402246
-
A fast image encryption system based on chaotic maps with finite precision representation
-
H.S. Kwok, Wallace K.S. Tang, A fast image encryption system based on chaotic maps with finite precision representation, Chaos, Solitons and Fractals 32 (2007) 1518-529.
-
(2007)
Chaos, Solitons and Fractals
, vol.32
, pp. 1518-1529
-
-
Kwok, H.S.1
Wallace, K.S.2
Tang3
-
3
-
-
1342306864
-
A symmetric image encryption scheme based on 3d chaotic cat maps
-
Chen G. Mao Y. Chui C. A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals 2004; 21: 749-61.
-
(2004)
Chaos, Solitons & Fractals
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.3
-
4
-
-
31444446656
-
A new chaotic algorithm for image encryption
-
H. Gao, Y. Zhang, S. Liang, D. Li, A new chaotic algorithm for image encryption, Chaos, Solitons and Fractals 29 (2006) 393-399.
-
(2006)
Chaos, Solitons and Fractals
, vol.29
, pp. 393-399
-
-
Gao, H.1
Zhang, Y.2
Liang, S.3
Li, D.4
-
5
-
-
1542316660
-
Image and video encryption using SCAN patterns
-
S.S. Maniccam, N.G. Bourbakis, Image and video encryption using SCAN patterns, Pattern Recognition 37 (4) (2004) 725-737.
-
(2004)
Pattern Recognition
, vol.37
, Issue.4
, pp. 725-737
-
-
Maniccam, S.S.1
Bourbakis, N.G.2
-
6
-
-
0031375810
-
Image data compression encryption using G-SCAN patterns
-
Orlando, Florida, USA, October
-
N.G. Bourbakis, Image data compression encryption using G-SCAN patterns, in: Proceedings of IEEE Conference on SMC, Orlando, Florida, USA, October 1997, pp. 1117-1120.
-
(1997)
Proceedings of IEEE Conference on SMC
, pp. 1117-1120
-
-
Bourbakis, N.G.1
-
7
-
-
0031273788
-
Image compression and encryption using tree structures
-
X.B. Li, J. Knipe, H. Cheng, Image compression and encryption using tree structures, Pattern Recognition Lett. 18 (11) (1997) 1253-1259.
-
(1997)
Pattern Recognition Lett
, vol.18
, Issue.11
, pp. 1253-1259
-
-
Li, X.B.1
Knipe, J.2
Cheng, H.3
-
8
-
-
0032045063
-
Large encrypting binary images with higher security
-
K.L. Chung, L.C. Chang, Large encrypting binary images with higher security, Pattern Recognition Lett. 19 (5) (1998) 461-468.
-
(1998)
Pattern Recognition Lett
, vol.19
, Issue.5
, pp. 461-468
-
-
Chung, K.L.1
Chang, L.C.2
-
9
-
-
33750532069
-
Image encryption by random grids
-
S. J. Shyu, Image encryption by random grids, Pattern Recognition 40 (2007), pp. 1014-1031.
-
(2007)
Pattern Recognition
, vol.40
, pp. 1014-1031
-
-
Shyu, S.J.1
-
10
-
-
17444411549
-
Efficient encryption of wavelet-based coded color images
-
K. Martin, R. Lukac, K. N. Plataniotis, Efficient encryption of wavelet-based coded color images, Pattern Recognition 38 (2005), pp. 1111-1115.
-
(2005)
Pattern Recognition
, vol.38
, pp. 1111-1115
-
-
Martin, K.1
Lukac, R.2
Plataniotis, K.N.3
-
11
-
-
0031273788
-
Image compression and encryption using tree structures
-
X.B. Li, J. Knipe, H. Cheng, Image compression and encryption using tree structures, Pattern Recognition Lett. 18 (11) (1997) 1253-1259.
-
(1997)
Pattern Recognition Lett
, vol.18
, Issue.11
, pp. 1253-1259
-
-
Li, X.B.1
Knipe, J.2
Cheng, H.3
-
13
-
-
0031222252
-
A linear quadtree compression scheme for image encryption
-
K.C. Chang, J.L. Liu, A linear quadtree compression scheme for image encryption, Signal Process. Image Commun. 10 (4) (1997) 279-290.
-
(1997)
Signal Process. Image Commun
, vol.10
, Issue.4
, pp. 279-290
-
-
Chang, K.C.1
Liu, J.L.2
-
14
-
-
33846425330
-
Image security system using recursive cellular automata substitution
-
R. j. Chen, J. L Lai, Image security system using recursive cellular automata substitution, Pattern Recognition 40 (2007), pp. 1621-1631.
-
(2007)
Pattern Recognition
, vol.40
, pp. 1621-1631
-
-
Chen, R.J.1
Lai, J.L.2
-
16
-
-
0041198138
-
Cellular automaton public key cryptosystems
-
P. Guam, Cellular automaton public key cryptosystems, Complex Syst. 1 (1987) 51-56.
-
(1987)
Complex Syst
, vol.1
, pp. 51-56
-
-
Guam, P.1
-
17
-
-
2642534013
-
Cryptography with dynamical systems
-
E. Goles, N. Boccara Eds, Kluwer Academic Publishers, Dordrecht
-
H. Gutowitz, Cryptography with dynamical systems, in: E. Goles, N. Boccara (Eds.), Cellular Automata and Cooperative Phenomena, Kluwer Academic Publishers, Dordrecht, 1993.
-
(1993)
Cellular Automata and Cooperative Phenomena
-
-
Gutowitz, H.1
-
18
-
-
84992720189
-
Cryptography with Cellular automata
-
Advances in Cryptography Crypto 85 Proceeding, Springer
-
S. Wolfram, Cryptography with Cellular automata, in: Advances in Cryptography Crypto 85 Proceeding, LNCS 218, Springer, 1986, pp 429-432.
-
(1986)
LNCS
, vol.218
, pp. 429-432
-
-
Wolfram, S.1
-
19
-
-
0024751836
-
Parallel random number generation for VLSI system using Cellular Automata
-
P.D. Hortensius, R.D. Mcleod, H.C. Card, Parallel random number generation for VLSI system using Cellular Automata, IEEE Transaction on Computers 85 (1989) 1366-1373.
-
(1989)
IEEE Transaction on Computers
, vol.85
, pp. 1366-1373
-
-
Hortensius, P.D.1
Mcleod, R.D.2
Card, H.C.3
-
21
-
-
49049096207
-
-
M. Sipper, M. Tomassini, Stream Ciphers with One and Towo-Dimensionals of Cellular Automata, in: M. schoenauer et al. (Eds), Parallel Problem Solving From Nature-PPSNVI, LNCS1917, Springer 2000, pp 772-731.
-
M. Sipper, M. Tomassini, Stream Ciphers with One and Towo-Dimensionals of Cellular Automata, in: M. schoenauer et al. (Eds), Parallel Problem Solving From Nature-PPSNVI, LNCS1917, Springer 2000, pp 772-731.
-
-
-
-
22
-
-
2642563715
-
Cellular automata computation and secret key cryptography
-
F. Seredynski, P. Bouvry, A.Y. Zomaya, Cellular automata computation and secret key cryptography, Parallel Computing 30 (2004) 753-766.
-
(2004)
Parallel Computing
, vol.30
, pp. 753-766
-
-
Seredynski, F.1
Bouvry, P.2
Zomaya, A.Y.3
-
24
-
-
84890522850
-
Communication theory of secrecy system
-
Shannon CE. Communication theory of secrecy system. Bell Syst Tech J 1949; 28:656-715.
-
(1949)
Bell Syst Tech J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
|