메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1266-1271

An Image Encryption System by cellular automata with memory

Author keywords

[No Author keywords available]

Indexed keywords

CELLULAR AUTOMATA; PATTERN RECOGNITION SYSTEMS; ROBOTS; TRANSLATION (LANGUAGES);

EID: 49049086543     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.121     Document Type: Conference Paper
Times cited : (40)

References (24)
  • 2
    • 33845402246 scopus 로고    scopus 로고
    • A fast image encryption system based on chaotic maps with finite precision representation
    • H.S. Kwok, Wallace K.S. Tang, A fast image encryption system based on chaotic maps with finite precision representation, Chaos, Solitons and Fractals 32 (2007) 1518-529.
    • (2007) Chaos, Solitons and Fractals , vol.32 , pp. 1518-1529
    • Kwok, H.S.1    Wallace, K.S.2    Tang3
  • 3
    • 1342306864 scopus 로고    scopus 로고
    • A symmetric image encryption scheme based on 3d chaotic cat maps
    • Chen G. Mao Y. Chui C. A symmetric image encryption scheme based on 3d chaotic cat maps. Chaos, Solitons & Fractals 2004; 21: 749-61.
    • (2004) Chaos, Solitons & Fractals , vol.21 , pp. 749-761
    • Chen, G.1    Mao, Y.2    Chui, C.3
  • 5
    • 1542316660 scopus 로고    scopus 로고
    • Image and video encryption using SCAN patterns
    • S.S. Maniccam, N.G. Bourbakis, Image and video encryption using SCAN patterns, Pattern Recognition 37 (4) (2004) 725-737.
    • (2004) Pattern Recognition , vol.37 , Issue.4 , pp. 725-737
    • Maniccam, S.S.1    Bourbakis, N.G.2
  • 6
    • 0031375810 scopus 로고    scopus 로고
    • Image data compression encryption using G-SCAN patterns
    • Orlando, Florida, USA, October
    • N.G. Bourbakis, Image data compression encryption using G-SCAN patterns, in: Proceedings of IEEE Conference on SMC, Orlando, Florida, USA, October 1997, pp. 1117-1120.
    • (1997) Proceedings of IEEE Conference on SMC , pp. 1117-1120
    • Bourbakis, N.G.1
  • 7
    • 0031273788 scopus 로고    scopus 로고
    • Image compression and encryption using tree structures
    • X.B. Li, J. Knipe, H. Cheng, Image compression and encryption using tree structures, Pattern Recognition Lett. 18 (11) (1997) 1253-1259.
    • (1997) Pattern Recognition Lett , vol.18 , Issue.11 , pp. 1253-1259
    • Li, X.B.1    Knipe, J.2    Cheng, H.3
  • 8
    • 0032045063 scopus 로고    scopus 로고
    • Large encrypting binary images with higher security
    • K.L. Chung, L.C. Chang, Large encrypting binary images with higher security, Pattern Recognition Lett. 19 (5) (1998) 461-468.
    • (1998) Pattern Recognition Lett , vol.19 , Issue.5 , pp. 461-468
    • Chung, K.L.1    Chang, L.C.2
  • 9
    • 33750532069 scopus 로고    scopus 로고
    • Image encryption by random grids
    • S. J. Shyu, Image encryption by random grids, Pattern Recognition 40 (2007), pp. 1014-1031.
    • (2007) Pattern Recognition , vol.40 , pp. 1014-1031
    • Shyu, S.J.1
  • 10
    • 17444411549 scopus 로고    scopus 로고
    • Efficient encryption of wavelet-based coded color images
    • K. Martin, R. Lukac, K. N. Plataniotis, Efficient encryption of wavelet-based coded color images, Pattern Recognition 38 (2005), pp. 1111-1115.
    • (2005) Pattern Recognition , vol.38 , pp. 1111-1115
    • Martin, K.1    Lukac, R.2    Plataniotis, K.N.3
  • 11
    • 0031273788 scopus 로고    scopus 로고
    • Image compression and encryption using tree structures
    • X.B. Li, J. Knipe, H. Cheng, Image compression and encryption using tree structures, Pattern Recognition Lett. 18 (11) (1997) 1253-1259.
    • (1997) Pattern Recognition Lett , vol.18 , Issue.11 , pp. 1253-1259
    • Li, X.B.1    Knipe, J.2    Cheng, H.3
  • 13
    • 0031222252 scopus 로고    scopus 로고
    • A linear quadtree compression scheme for image encryption
    • K.C. Chang, J.L. Liu, A linear quadtree compression scheme for image encryption, Signal Process. Image Commun. 10 (4) (1997) 279-290.
    • (1997) Signal Process. Image Commun , vol.10 , Issue.4 , pp. 279-290
    • Chang, K.C.1    Liu, J.L.2
  • 14
    • 33846425330 scopus 로고    scopus 로고
    • Image security system using recursive cellular automata substitution
    • R. j. Chen, J. L Lai, Image security system using recursive cellular automata substitution, Pattern Recognition 40 (2007), pp. 1621-1631.
    • (2007) Pattern Recognition , vol.40 , pp. 1621-1631
    • Chen, R.J.1    Lai, J.L.2
  • 16
    • 0041198138 scopus 로고
    • Cellular automaton public key cryptosystems
    • P. Guam, Cellular automaton public key cryptosystems, Complex Syst. 1 (1987) 51-56.
    • (1987) Complex Syst , vol.1 , pp. 51-56
    • Guam, P.1
  • 17
    • 2642534013 scopus 로고
    • Cryptography with dynamical systems
    • E. Goles, N. Boccara Eds, Kluwer Academic Publishers, Dordrecht
    • H. Gutowitz, Cryptography with dynamical systems, in: E. Goles, N. Boccara (Eds.), Cellular Automata and Cooperative Phenomena, Kluwer Academic Publishers, Dordrecht, 1993.
    • (1993) Cellular Automata and Cooperative Phenomena
    • Gutowitz, H.1
  • 18
    • 84992720189 scopus 로고
    • Cryptography with Cellular automata
    • Advances in Cryptography Crypto 85 Proceeding, Springer
    • S. Wolfram, Cryptography with Cellular automata, in: Advances in Cryptography Crypto 85 Proceeding, LNCS 218, Springer, 1986, pp 429-432.
    • (1986) LNCS , vol.218 , pp. 429-432
    • Wolfram, S.1
  • 19
    • 0024751836 scopus 로고
    • Parallel random number generation for VLSI system using Cellular Automata
    • P.D. Hortensius, R.D. Mcleod, H.C. Card, Parallel random number generation for VLSI system using Cellular Automata, IEEE Transaction on Computers 85 (1989) 1366-1373.
    • (1989) IEEE Transaction on Computers , vol.85 , pp. 1366-1373
    • Hortensius, P.D.1    Mcleod, R.D.2    Card, H.C.3
  • 20
    • 0028750092 scopus 로고
    • Theory and application of cellular automata in Cryptography
    • S. Nadi, B.K. Kar, P.P. Chaudhuri, Theory and application of cellular automata in Cryptography, IEEE Transactions on computers 43 (1994) 1346-1357.
    • (1994) IEEE Transactions on computers , vol.43 , pp. 1346-1357
    • Nadi, S.1    Kar, B.K.2    Chaudhuri, P.P.3
  • 21
    • 49049096207 scopus 로고    scopus 로고
    • M. Sipper, M. Tomassini, Stream Ciphers with One and Towo-Dimensionals of Cellular Automata, in: M. schoenauer et al. (Eds), Parallel Problem Solving From Nature-PPSNVI, LNCS1917, Springer 2000, pp 772-731.
    • M. Sipper, M. Tomassini, Stream Ciphers with One and Towo-Dimensionals of Cellular Automata, in: M. schoenauer et al. (Eds), Parallel Problem Solving From Nature-PPSNVI, LNCS1917, Springer 2000, pp 772-731.
  • 22
    • 2642563715 scopus 로고    scopus 로고
    • Cellular automata computation and secret key cryptography
    • F. Seredynski, P. Bouvry, A.Y. Zomaya, Cellular automata computation and secret key cryptography, Parallel Computing 30 (2004) 753-766.
    • (2004) Parallel Computing , vol.30 , pp. 753-766
    • Seredynski, F.1    Bouvry, P.2    Zomaya, A.Y.3
  • 24
    • 84890522850 scopus 로고
    • Communication theory of secrecy system
    • Shannon CE. Communication theory of secrecy system. Bell Syst Tech J 1949; 28:656-715.
    • (1949) Bell Syst Tech J , vol.28 , pp. 656-715
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.