-
1
-
-
51849160074
-
A new chaotic algorithm for image encryption
-
Z. Xin and C. Weibin, "A new chaotic algorithm for image encryption," in Audio, Language and Image Processing, 2008. ICALIP 2008. International Conference on, 2008, pp. 889-892.
-
Audio, Language and Image Processing, 2008. ICALIP 2008. International Conference On, 2008
, pp. 889-892
-
-
Xin, Z.1
Weibin, C.2
-
2
-
-
1342306864
-
A symmetric image encryption scheme based on 3D chaotic cat maps
-
G. Chen, Y. Mao, and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons & Fractals, vol. 21, pp. 749-761,2004.
-
(2004)
Chaos, Solitons & Fractals
, vol.21
, pp. 749-761
-
-
Chen, G.1
Mao, Y.2
Chui, C.K.3
-
3
-
-
70349308697
-
A novel image encryption scheme using Lorenz attractor
-
G. M. B. S. S. Kumar and V. Chandrasekaran, "A novel image encryption scheme using Lorenz attractor," in Industrial Electronics and Applications, 2009. ICIEA 2009. 4th IEEE Conference on, 2009, pp. 3662-3666.
-
Industrial Electronics and Applications, 2009. ICIEA 2009. 4th IEEE Conference On, 2009
, pp. 3662-3666
-
-
Kumar, G.M.B.S.S.1
Chandrasekaran, V.2
-
4
-
-
58149145108
-
An image encryption scheme based on generalized synchronization theorem for discrete array systems
-
Z. Hongyan and M. Lequan, "An image encryption scheme based on generalized synchronization theorem for discrete array systems," in Communications, Circuits and Systems, 2008. ICCCAS 2008. International Conference on, 2008, pp. 991-995.
-
Communications, Circuits and Systems, 2008. ICCCAS 2008. International Conference On, 2008
, pp. 991-995
-
-
Hongyan, Z.1
Lequan, M.2
-
5
-
-
12244258246
-
An image encryption approach based on chaotic maps
-
L. Zhang, X. Liao, and X. Wang, "An image encryption approach based on chaotic maps," Chaos, Solitons & Fractals, vol. 24, pp. 759-765,2005.
-
(2005)
Chaos, Solitons & Fractals
, vol.24
, pp. 759-765
-
-
Zhang, L.1
Liao, X.2
Wang, X.3
-
6
-
-
33845402246
-
A fast image encryption system based on chaotic maps with finite precision representation
-
H. S. Kwok and W. K. S. Tang, "A fast image encryption system based on chaotic maps with finite precision representation," Chaos, Solitons & Fractals, vol. 32, pp. 1518-1529,2007.
-
(2007)
Chaos, Solitons & Fractals
, vol.32
, pp. 1518-1529
-
-
Kwok, H.S.1
Tang, W.K.S.2
-
7
-
-
17144443264
-
Chaos-based cryptograph incorporated with S-box algebraic operation
-
G. Tang, S. Wang, H. Lu, and G. Hu, "Chaos-based cryptograph incorporated with S-box algebraic operation," Physics Letters, Section A: General, Atomic and Solid State Physics, vol. 318, pp. 388-398, 2003.
-
(2003)
Physics Letters, Section A: General, Atomic and Solid State Physics
, vol.318
, pp. 388-398
-
-
Tang, G.1
Wang, S.2
Lu, H.3
Hu, G.4
-
8
-
-
0000326312
-
Picture data encryption using scan patterns
-
N. Bourbakis and C. Alexopoulos, "Picture data encryption using scan patterns," Pattern Recognition, vol. 25, pp. 567-581, 1992.
-
(1992)
Pattern Recognition
, vol.25
, pp. 567-581
-
-
Bourbakis, N.1
Alexopoulos, C.2
-
9
-
-
79955334148
-
Solving, rating and generating Sudoku puzzles with GA
-
T. Mantere and J. Koljonen, "Solving, rating and generating Sudoku puzzles with GA," in Evolutionary Computation, 2007. CEC 2007. IEEE Congress on, 2007, pp. 1382-1389.
-
Evolutionary Computation, 2007. CEC 2007. IEEE Congress On, 2007
, pp. 1382-1389
-
-
Mantere, T.1
Koljonen, J.2
-
10
-
-
85008018426
-
Sinkhorn Solves Sudoku
-
T. K. Moon, J. H. Gunther, and J. J. Kupin, "Sinkhorn Solves Sudoku," Information Theory, IEEE Transactions on, vol. 55, pp. 1741-1746,2009.
-
(2009)
Information Theory, IEEE Transactions on
, vol.55
, pp. 1741-1746
-
-
Moon, T.K.1
Gunther, J.H.2
Kupin, J.J.3
-
11
-
-
57649201054
-
A New Algorithm for Generating Unique-Solution Sudoku
-
S. Baochen, S. Xiwei, W. Vue, Y. Yiling, and Y. Goping, "A New Algorithm for Generating Unique-Solution Sudoku," in Natural Computation, 2008. ICNC '08. Fourth International Conference on, 2008, pp. 215-217.
-
Natural Computation, 2008. ICNC '08. Fourth International Conference On, 2008
, pp. 215-217
-
-
Baochen, S.1
Xiwei, S.2
Vue, W.3
Yiling, Y.4
Goping, Y.5
-
12
-
-
50049096748
-
Steganography in SMS by Sudoku puzzle
-
M. H. Shirali-Shahreza and M. Shirali-Shahreza, "Steganography in SMS by Sudoku puzzle," in Computer Systems and Applications, 2008. AlCCSA 2008. IEEE/ACS International Conference on, 2008, pp. 844-847.
-
Computer Systems and Applications, 2008. AlCCSA 2008. IEEE/ACS International Conference On, 2008
, pp. 844-847
-
-
Shirali-Shahreza, M.H.1
Shirali-Shahreza, M.2
-
13
-
-
52449107831
-
An Information Hiding Scheme Using Sudoku
-
C. Chin-Chen, C. Yung-Chen, and K. The Duc, "An Information Hiding Scheme Using Sudoku," in Innovative Computing Information and Control, 2008. ICICIC '08. 3rd International Conference on, 2008, pp. 17-17.
-
Innovative Computing Information and Control, 2008. ICICIC '08. 3rd International Conference On, 2008
, pp. 17-17
-
-
Chin-Chen, C.1
Yung-Chen, C.2
The Duc, K.3
-
14
-
-
62949149668
-
Steganography Using Sudoku Revisited
-
H. Wien, C. Tung-Shou, and S. Chih-Wei, "Steganography Using Sudoku Revisited," in Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium on, 2008, pp. 935-939.
-
Intelligent Information Technology Application, 2008. IITA '08. Second International Symposium On, 2008
, pp. 935-939
-
-
Wien, H.1
Tung-Shou, C.2
Chih-Wei, S.3
-
15
-
-
62449319548
-
A Minimal Euclidean Distance Searching Technique for Sudoku Steganography
-
H. Wien, C. Tung-Shou, and S. Chih-Wei, "A Minimal Euclidean Distance Searching Technique for Sudoku Steganography," in Information Science and Engieering, 2008. ISISE '08. International Symposium on, 2008, pp. 515-518.
-
Information Science and Engieering, 2008. ISISE '08. International Symposium On, 2008
, pp. 515-518
-
-
Wien, H.1
Tung-Shou, C.2
Chih-Wei, S.3
-
16
-
-
72149126095
-
Sudoku: Strategy versus Structure
-
J. Provan, "Sudoku: Strategy versus Structure," American Mathematical Monthly, vol. 116, pp. 702-707,2009.
-
(2009)
American Mathematical Monthly
, vol.116
, pp. 702-707
-
-
Provan, J.1
-
17
-
-
2642584905
-
Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES)
-
R. C. W. Phan, "Impossible differential cryptanalysis of 7-round Advanced Encryption Standard (AES)," Information Processing Letters, vol. 91, pp. 33-38,2004.
-
(2004)
Information Processing Letters
, vol.91
, pp. 33-38
-
-
Phan, R.C.W.1
-
18
-
-
33744900041
-
-
Tech. Report, GE Research & Development Center, 2002GRC 1772002
-
S. Evans, J. Hershey, and G. Saulnier, "Kolmogorov Complexity Estimation and Analysis," Tech. Report, GE Research & Development Center, 2002GRC 1772002.
-
Kolmogorov Complexity Estimation and Analysis
-
-
Evans, S.1
Hershey, J.2
Saulnier, G.3
-
19
-
-
0016880887
-
On the Complexity of Finite Sequences
-
A. Lempel and J. Ziv, "On the Complexity of Finite Sequences," Information Theory, IEEE Transactions on, vol. 22, pp. 75-81,1976.
-
(1976)
Information Theory, IEEE Transactions on
, vol.22
, pp. 75-81
-
-
Lempel, A.1
Ziv, J.2
-
20
-
-
12144290812
-
Estimating the Entropy Rate of Spike Trains via Lempel-Ziv Complexity
-
A. M. Amigo, J. Szczepanski, E. Wajnryb, and M. V. Sanchez-Vives, "Estimating the Entropy Rate of Spike Trains via Lempel-Ziv Complexity," Neural Computation, vol. 16, pp. 717-736,2004.
-
(2004)
Neural Computation
, vol.16
, pp. 717-736
-
-
Amigo, A.M.1
Szczepanski, J.2
Wajnryb, E.3
Sanchez-Vives, M.V.4
-
22
-
-
35949011257
-
Easily calculable measure for the complexity of spatiotemporal patterns
-
F. Kaspar and H. G. Schuster, "Easily calculable measure for the complexity of spatiotemporal patterns," Physical Review A, vol. 36, p. 842, 1987.
-
(1987)
Physical Review A
, vol.36
, pp. 842
-
-
Kaspar, F.1
Schuster, H.G.2
-
23
-
-
78751472098
-
-
S. Faul, "Kolmogrov Complexity. " 2005. URL: http://www.mathworks.it/matlabcentral/fileexchange/6886-kolmogorov-complexity
-
(2005)
Kolmogrov Complexity
-
-
Faul, S.1
|