-
1
-
-
77950377556
-
An optimized implementation of the S-Box using residue of prime numbers
-
Abuelyman ES, Alsehibani AAS (2008). An optimized implementation of the S-Box using residue of prime numbers. Int. J. Comput. Sci. Ntwk. Secur., 8(4): 304-309.
-
(2008)
Int. J. Comput. Sci. Ntwk. Secur.
, vol.8
, Issue.4
, pp. 304-309
-
-
Abuelyman, E.S.1
Alsehibani, A.A.S.2
-
2
-
-
0038343416
-
Steganalysis using image quality metrics
-
Avcibas I, Memon N, Sankur B (2003). Steganalysis using image quality metrics. IEEE T. IM proc., 12(2): 221-229.
-
(2003)
IEEE T. IM proc.
, vol.12
, Issue.2
, pp. 221-229
-
-
Avcibas, I.1
Memon, N.2
Sankur, B.3
-
3
-
-
78951479954
-
Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study
-
Alam GM, Mat Kiah ML, Zaidan BB, Zaidan AA, Alanazi HO (2010). Using the features of mosaic image and AES cryptosystem to implement an extremely high rate and high secure data hidden: Analytical study. Int. J. Phys. Sci., 5(21): 3254-3260.
-
(2010)
Int. J. Phys. Sci.
, vol.5
, Issue.21
, pp. 3254-3260
-
-
Alam, G.M.1
Mat Kiah, M.L.2
Zaidan, B.B.3
Zaidan, A.A.4
Alanazi, H.O.5
-
4
-
-
60349092090
-
A new S-box structure named Affine-Power-Affine
-
Cui L, Cao Y (2007). A new S-box structure named Affine-Power-Affine. Int. J. Innov. Comput. I., 3(3): 45-53.
-
(2007)
Int. J. Innov. Comput. I.
, vol.3
, Issue.3
, pp. 45-53
-
-
Cui, L.1
Cao, Y.2
-
5
-
-
0026221493
-
Split and merge image segmentation based on localized feature analysis and statistical tests
-
Chen SY, Lin WC, Chen CT (1991). Split and merge image segmentation based on localized feature analysis and statistical tests. Graph Model. IM proc., 53(5): 457-475.
-
(1991)
Graph Model. IM proc.
, vol.53
, Issue.5
, pp. 457-475
-
-
Chen, S.Y.1
Lin, W.C.2
Chen, C.T.3
-
6
-
-
0004181422
-
-
AES Algorithm Submission, Available
-
Daemen J, Rijmen V (1999). AES Proposal: Rijndael. AES Algorithm Submission, Available: http://csrc.nist.gov/archive/aes/rijndael/ Rijndael-ammended.pdf.
-
(1999)
AES Proposal: Rijndael
-
-
Daemen, J.1
Rijmen, V.2
-
7
-
-
79956342887
-
Image encryption via logistic map function and heap tree
-
Enayatifar R (2011). Image encryption via logistic map function and heap tree. Int. J. Phys. Sci., 6(2): 221:228.
-
(2011)
Int. J. Phys. Sci., 6(2):
, vol.221
, pp. 228
-
-
Enayatifar, R.1
-
8
-
-
2942642475
-
A vision system for surface roughness characterization using the gray level co-occurrence matrix
-
Gadelmawla ES (2004). A vision system for surface roughness characterization using the gray level co-occurrence matrix. NDT & E. Int., 37(7): 577-588.
-
(2004)
NDT & E. Int.
, vol.37
, Issue.7
, pp. 577-588
-
-
Gadelmawla, E.S.1
-
9
-
-
80052654803
-
A New Algorithm to Construct Secure Keys for AES
-
Hussain I, Shah T, Mehmood H (2010). A New Algorithm to Construct Secure Keys for AES. Int. J. Cont. Math. Sci., 5(26): 1263-1270.
-
(2010)
Int. J. Cont. Math. Sci.
, vol.5
, Issue.26
, pp. 1263-1270
-
-
Hussain, I.1
Shah, T.2
Mehmood, H.3
-
10
-
-
0037746045
-
Unsupervised image segmentation using local homogeneity analysis
-
Jing F, Li M, Zhang H, Zhang B (2003). Unsupervised image segmentation using local homogeneity analysis. Proc. ISCAS, 2: 456-459.
-
(2003)
Proc. ISCAS
, vol.2
, pp. 456-459
-
-
Jing, F.1
Li, M.2
Zhang, H.3
Zhang, B.4
-
11
-
-
33744494874
-
An AES S-box to increase complexity and cryptgraphic analysis
-
Lui J, Wai B, Cheng X, Wang X (2005). An AES S-box to increase complexity and cryptgraphic analysis. Int. Conf. Infor. Network. Appl., 1: 724-728.
-
(2005)
Int. Conf. Infor. Network. Appl.
, vol.1
, pp. 724-728
-
-
Lui, J.1
Wai, B.2
Cheng, X.3
Wang, X.4
-
12
-
-
80052680833
-
Public key cryptosystems based on chaotic Chebyshev polynomials
-
Prasadh K, Ramar K, Gnanajeyaraman R (2009). Public key cryptosystems based on chaotic Chebyshev polynomials. Int. J. Phys. Sci., 1(7): 122-128.
-
(2009)
Int. J. Phys. Sci.
, vol.1
, Issue.7
, pp. 122-128
-
-
Prasadh, K.1
Ramar, K.2
Gnanajeyaraman, R.3
-
14
-
-
80052671998
-
KEA Algorithm
-
SKIPJACK
-
SKIPJACK (1998). KEA Algorithm. Specifications version, 2(29): 1-23.
-
(1998)
Specifications version
, vol.2
, Issue.29
, pp. 1-23
-
-
-
16
-
-
12244258246
-
An Image encryption approach based on chaotic maps
-
Zhang L, Liao X, Wang X (2005). An Image encryption approach based on chaotic maps. Chaos Solution Fract., 24:759-765.
-
(2005)
Chaos Solution Fract.
, vol.24
, pp. 759-765
-
-
Zhang, L.1
Liao, X.2
Wang, X.3
|