-
1
-
-
26844567623
-
Design of integrated multimedia compression and encryption systems
-
Oct.
-
C. P.Wu and C. C. J. Kuo, "Design of integrated multimedia compression and encryption systems," IEEE Trans. Multimedia, vol. 7, no. 5, pp. 828-839, Oct. 2005.
-
(2005)
IEEE Trans. Multimedia
, vol.7
, Issue.5
, pp. 828-839
-
-
Wu, C.P.1
Kuo, C.C.J.2
-
2
-
-
33749506982
-
Multimedia selective encryption by means of randomized arithmetic coding
-
DOI 10.1109/TMM.2006.879919, 1703505
-
M. Grangetto, E. Magli, and G. Olmo, "Multimedia selective encryption by means of randomized arithmetic coding," IEEE Trans. Multimedia, vol. 8, no. 5, pp. 905-917, Oct. 2006. (Pubitemid 44523105)
-
(2006)
IEEE Transactions on Multimedia
, vol.8
, Issue.5
, pp. 905-917
-
-
Grangetto, M.1
Magli, E.2
Olmo, G.3
-
3
-
-
31344478024
-
Binary arithmetic coding with key-based interval splitting
-
DOI 10.1109/LSP.2005.861589
-
J. Wen, H. Kim, and J. Villasenor, "Binary arithmetic coding with keybased interval splitting," IEEE Signal Process. Lett., vol. 13, no. 2, pp. 69-72, Feb. 2006. (Pubitemid 43137974)
-
(2006)
IEEE Signal Processing Letters
, vol.13
, Issue.2
, pp. 69-72
-
-
Wen, J.G.1
Kim, H.2
Villasenor, J.D.3
-
4
-
-
34247866284
-
Secure arithmetic coding
-
DOI 10.1109/TSP.2007.892710
-
H. Kim, J. Wen, and J. Villasenor, "Secure arithmetic coding," IEEE Trans. Signal Process., vol. 55, no. 5, pp. 2263-2272, May 2007. (Pubitemid 46691604)
-
(2007)
IEEE Transactions on Signal Processing
, vol.55
, Issue.5
, pp. 2263-2272
-
-
Kim, H.1
Wen, J.2
Villasenor, J.D.3
-
5
-
-
57949091424
-
Embedding compression in chaos-based cryptography
-
Nov.
-
K. W. Wong and C. H. Yuen, "Embedding compression in chaos-based cryptography," IEEE Trans. Circuits Syst. II, Exp. Briefs, vol. 55, no. 11, pp. 1193-1197, Nov. 2008.
-
(2008)
IEEE Trans. Circuits Syst. II, Exp. Briefs
, vol.55
, Issue.11
, pp. 1193-1197
-
-
Wong, K.W.1
Yuen, C.H.2
-
6
-
-
33947609586
-
Security analysis of multimedia encryption schemes based on multiple Huffman table
-
DOI 10.1109/LSP.2006.884012
-
J. Zhou, Z. Liang, Y. Chen, and O. C. Au, "Security analysis of multimedia encryption schemes based on multiple Huffman table," IEEE Signal Process. Lett., vol. 14, no. 3, pp. 201-204, Mar. 2007. (Pubitemid 46477702)
-
(2007)
IEEE Signal Processing Letters
, vol.14
, Issue.3
, pp. 201-204
-
-
Zhou, J.1
Liang, Z.2
Chen, Y.3
Au, O.C.4
-
7
-
-
41549134129
-
Cryptanalysis of some multimedia encryption schemes
-
DOI 10.1109/TMM.2008.917355, 4459284
-
G. Jakimoski and K. Subbalakshmi, "Cryptanalysis of some multimedia encryption schemes," IEEE Trans. Multimedia, vol. 10, no. 3, pp. 330-338, Apr. 2008. (Pubitemid 351459497)
-
(2008)
IEEE Transactions on Multimedia
, vol.10
, Issue.3
, pp. 330-338
-
-
Jakimoski, G.1
Subbalakshmi, K.P.2
-
8
-
-
65649146097
-
Adaptive chosen-ciphertext attack on secure arithmetic coding
-
May
-
J. Zhou, O. C. Au, and P. H. Wong, "Adaptive chosen-ciphertext attack on secure arithmetic coding," IEEE Trans. Signal Process., vol. 57, no. 5, pp. 1825-1838, May 2009.
-
(2009)
IEEE Trans. Signal Process.
, vol.57
, Issue.5
, pp. 1825-1838
-
-
Zhou, J.1
Au, O.C.2
Wong, P.H.3
-
9
-
-
0042786512
-
Cryptography with chaos
-
PII S0375960198000863
-
M. S. Baptista, "Cryptography with chaos," Phys. Lett. A, vol. 240, no. 1/2, pp. 50-54, Mar. 1998. (Pubitemid 128390514)
-
(1998)
Physics Letters, Section A: General, Atomic and Solid State Physics
, vol.240
, Issue.1-2
, pp. 50-54
-
-
Baptista, M.S.1
-
10
-
-
79952036382
-
-
[Online].Available
-
[Online].Available: ftp://ftp.cpsc.ucalgary.ca/pub/projects/text. compression. corpus
-
-
-
-
11
-
-
33750542126
-
Some basic cryptographic requirements for chaos-based cryptosystems
-
DOI 10.1142/S0218127406015970, PII S0218127406015970
-
G. Alvarez and S. Li, "Some basic cryptographic requirements for chaosbased cryptosystems," Int. J. Bifurcat. Chaos, vol. 16, no. 8, pp. 2129-2151, 2006. (Pubitemid 44671739)
-
(2006)
International Journal of Bifurcation and Chaos
, vol.16
, Issue.8
, pp. 2129-2151
-
-
Alvarez, G.1
Li, S.2
-
12
-
-
42949117806
-
Design of block ciphers by simple chaotic functions
-
May
-
C. M. Ou, "Design of block ciphers by simple chaotic functions," IEEE Comput. Intell. Mag., vol. 3, no. 2, pp. 54-59, May 2008.
-
(2008)
IEEE Comput. Intell. Mag.
, vol.3
, Issue.2
, pp. 54-59
-
-
Ou, C.M.1
-
13
-
-
34247229565
-
A class of maximum-period nonlinear congruential generators derived from the rényi chaotic map
-
DOI 10.1109/TCSI.2007.890622
-
T. Addabbo, M. Alioto, F. Fort, A. Pasini, S. Rocchi, and V. Vignoli, "A class of maximum-period nonlinear congruential generators derived from the Rényi chaotic map," IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 54, no. 4, pp. 816-828, Apr. 2007. (Pubitemid 46621573)
-
(2007)
IEEE Transactions on Circuits and Systems I: Regular Papers
, vol.54
, Issue.4
, pp. 816-828
-
-
Addabbo, T.1
Alioto, M.2
Fort, A.3
Pasini, A.4
Rocchi, S.5
Vignoli, V.6
-
15
-
-
0003822632
-
-
Apr. 27, NIST Special Publication, [Online]. Available
-
A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo, (2010, Apr. 27). A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications, NIST Special Publication 800-22. [Online]. Available: http://csrc.nist.gov/groups/ST/toolkit/ rng/documentation-software.html
-
(2010)
A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications
, pp. 800-822
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Smid, M.4
Barker, E.5
Leigh, S.6
Levenson, M.7
Vangel, M.8
Banks, D.9
Heckert, A.10
Dray, J.11
Vo, S.12
|