-
1
-
-
0003508570
-
-
National Institute of Standards and Technology, "Data Encryption Standard (DES)," http://csrc.nist.gov/publications/fips/fips46-3/fips46-3. pdf, 1999.
-
(1999)
Data Encryption Standard (DES)
-
-
-
2
-
-
0003508558
-
-
National Institute of Standards and Technology, "Advanced Encryption Standard (AES)," http://csrc.nist.gov/publications/fips/fips197/fips-197. pdf, 2001.
-
(2001)
Advanced Encryption Standard (AES)
-
-
-
3
-
-
46249086423
-
Security traffic image transmission based on EZW and AES
-
Qibin Hou and Yangsheng Wang, "Security traffic image transmission based on EZW and AES," in Intelligent Transportation Systems, 2003. Proceedings. 2003 IEEE, 2003, pp. 86-89 vol.1.
-
(2003)
Intelligent Transportation Systems, 2003. Proceedings. 2003 IEEE
, vol.1
, pp. 86-89
-
-
Hou, Q.1
Wang, Y.2
-
4
-
-
4344691479
-
-
Jiancheng Zou, Rabab K. Ward, and Dongxu Qi, A new digital image scrambling method based on Fibonacci numbers, in Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on, 2004, pp. III-965-8 3.
-
Jiancheng Zou, Rabab K. Ward, and Dongxu Qi, "A new digital image scrambling method based on Fibonacci numbers," in Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on, 2004, pp. III-965-8 Vol.3.
-
-
-
-
5
-
-
4544337440
-
-
Jiancheng Zou, Rabab K. Ward, and Dongxu Qi, The generalized Fibonacci transformations and application to image scrambling, in Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP 04). IEEE International Conference on, 2004, pp. iii-385-8 3.
-
Jiancheng Zou, Rabab K. Ward, and Dongxu Qi, "The generalized Fibonacci transformations and application to image scrambling," in Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP 04). IEEE International Conference on, 2004, pp. iii-385-8 vol.3.
-
-
-
-
7
-
-
43249118670
-
Two Fibonacci P-code based image scrambling algorithms
-
San Jose, CA, USA
-
Yicong Zhou, Sos Agaian, Valencia M. Joyner, and Karen Panetta, "Two Fibonacci P-code based image scrambling algorithms," in Image Processing: Algorithms and Systems VI, San Jose, CA, USA, 2008, pp. 681215-12.
-
(2008)
Image Processing: Algorithms and Systems VI
, pp. 681215-681312
-
-
Zhou, Y.1
Agaian, S.2
Joyner, V.M.3
Panetta, K.4
-
8
-
-
44949159851
-
P-recursive sequence and key-dependent multimedia scrambling
-
Orlando, FL, USA
-
Yicong Zhou, Karen Panetta, and Sos Agaian, "P-recursive sequence and key-dependent multimedia scrambling," in Mobile Multimedia/Image Processing, Security, and Applications 2008, Orlando, FL, USA, 2008, pp. 69820H-12.
-
(2008)
Mobile Multimedia/Image Processing, Security, and Applications 2008
-
-
Zhou, Y.1
Panetta, K.2
Agaian, S.3
-
9
-
-
42049108003
-
A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
-
Shujun Li, Chengqing Li, Guanrong Chen, Nikolaos G. Bourbakis, and Kwok-Tung Lo, "A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks," Signal Processing: Image Communication, vol. 23, no. 3, pp. 212-223, 2008.
-
(2008)
Signal Processing: Image Communication
, vol.23
, Issue.3
, pp. 212-223
-
-
Li, S.1
Li, C.2
Chen, G.3
Bourbakis, N.G.4
Lo, K.-T.5
-
10
-
-
24944459842
-
Chaos-based image encryption algorithm
-
Oct
-
Z. H. Guan, F. J. Huang, and W. J. Guan, "Chaos-based image encryption algorithm," Physics Letters A, vol. 346, no. 1-3, pp. 153-157, Oct 2005.
-
(2005)
Physics Letters A
, vol.346
, Issue.1-3
, pp. 153-157
-
-
Guan, Z.H.1
Huang, F.J.2
Guan, W.J.3
-
11
-
-
1342306864
-
A symmetric image encryption scheme based on 3D chaotic cat maps
-
Guanrong Chen, Yaobin Mao, and Charles K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749-761, 2004.
-
(2004)
Chaos, Solitons & Fractals
, vol.21
, Issue.3
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
12
-
-
34548857340
-
A New Image Encryption Scheme based on Hyperchaotic Sequences
-
Chuanmu Li and Lianxi Hong, "A New Image Encryption Scheme based on Hyperchaotic Sequences," in Anticounterfeiting, Security, Identification, 2007 IEEE International Workshop on, 2007, pp. 237-240.
-
(2007)
Anticounterfeiting, Security, Identification, 2007 IEEE International Workshop on
, pp. 237-240
-
-
Li, C.1
Hong, L.2
-
13
-
-
24344458602
-
3D Extensions of Some 2D Chaotic Maps and Their Usage in Data Encryption
-
Shiguo Lian, Yaobin Mao, and Zhiquan Wang, "3D Extensions of Some 2D Chaotic Maps and Their Usage in Data Encryption," in Control and Automation, 2003. ICCA '03. Proceedings. 4th International Conference on, 2003, pp. 819-823.
-
(2003)
Control and Automation, 2003. ICCA '03. Proceedings. 4th International Conference on
, pp. 819-823
-
-
Lian, S.1
Mao, Y.2
Wang, Z.3
|