-
1
-
-
27944455687
-
An image watermarking technique using CAT
-
R. Shiba, S. Kang and Y. Aoki, An image watermarking technique using CAT, 2004 IEEE Region 10 Conference, vol. l, pp.303-306, 2004.
-
(2004)
2004 IEEE Region 10 Conference
, vol.1
, pp. 303-306
-
-
Shiba, R.1
Kang, S.2
Aoki, Y.3
-
2
-
-
84867557917
-
Cellular automata based authentication
-
Switzerland
-
M. Mukherjee, N. Ganguly and P. Pal Chaudhuri, Cellular automata based authentication, ACRI, Switzerland, pp.259-269, 2002.
-
(2002)
ACRI
, pp. 259-269
-
-
Mukherjee, M.1
Ganguly, N.2
Pal Chaudhuri, P.3
-
6
-
-
69549132730
-
Image encryption/decryption system using 2-D cellular automata
-
R. J. Chen, Y. H. Chen, C. S. Chen and J. L. Lai, Image encryption/decryption system using 2-D cellular automata, ISCE, pp.1-6, 2006.
-
(2006)
ISCE
, pp. 1-6
-
-
Chen, R.J.1
Chen, Y.H.2
Chen, C.S.3
Lai, J.L.4
-
7
-
-
77954275043
-
Contents-based digital image protection using 2-D cellular automata transforms
-
J. W. Shin, S. Yoon and D. S. Park, Contents-based digital image protection using 2-D cellular automata transforms, I KICK Electronics Express, vol.7, no. ll, pp.772-778, 2010.
-
(2010)
I KICK Electronics Express
, vol.7
, Issue.2
, pp. 772-778
-
-
Shin, J.W.1
Yoon, S.2
Park, D.S.3
-
8
-
-
78651449565
-
A DCT-SVD domain watermarking algorithm for digital image based on Moore-model cellular automata scrambling
-
W. C. Rong, L. J. Jing and L. G. Ying, A DCT-SVD domain watermarking algorithm for digital image based on Moore-model cellular automata scrambling, ICISS, pp.104-108, 2010.
-
(2010)
ICISS
, pp. 104-108
-
-
Rong, W.C.1
Jing, L.J.2
Ying, L.G.3
-
9
-
-
63849234523
-
An image watermarking scheme with tamper detection and recovery
-
S. D. Lin, Y. Kuo and M. Yao, An image watermarking scheme with tamper detection and recovery, International Journal of Innovative Computing, Information and Control, vol.3, no.6(A), pp.1379-1387, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.6 A
, pp. 1379-1387
-
-
Lin, S.D.1
Kuo, Y.2
Yao, M.3
-
10
-
-
84866044580
-
Method and apparatus for data incryption/decryption using cellular automata transform
-
O. E. Lafe, Method and apparatus for data incryption/decryption using cellular automata transform, U.S. Patent No.5677956, 1997.
-
(1997)
U.S. Patent No.5677956
-
-
Lafe, O.E.1
-
11
-
-
4344698511
-
-
Kluwer Academic Publishers, Boston/Dordrecht/London
-
O. Lafe, Cellular Automata Transforms: Theory and Application in Multimedia Compression, En-cryption, and Modeling, Kluwer Academic Publishers, Boston/Dordrecht/London, 2000.
-
(2000)
Cellular Automata Transforms: Theory and Application in Multimedia Compression, En-cryption, and Modeling
-
-
Lafe, O.1
-
12
-
-
84866029787
-
Image encryption using non-linear FSR and complement MLCA
-
T. H. Nam, S. T. Kim and S. J. Cho, Image encryption using non-linear FSR and complement MLCA, ICMICS, vol.2, no. l, pp.168-171, 2009.
-
(2009)
ICMICS
, vol.2
, Issue.1
, pp. 168-171
-
-
Nam, T.H.1
Kim, S.T.2
Cho, S.J.3
-
13
-
-
34047272314
-
Analysis of complemented CA derived from linear hybrid group CA
-
S. J. Cho, U. S. Choi et al., Analysis of complemented CA derived from linear hybrid group CA, Computers and Mathematics with Applications, vol.53, no. l, pp.54-63, 2007.
-
(2007)
Computers and Mathematics with Applications
, vol.53
, Issue.1
, pp. 54-63
-
-
Cho, S.J.1
Choi, U.S.2
-
14
-
-
0031364865
-
Data compression and encryption using cellular automata transforms
-
O. E. Lafe, Data compression and encryption using cellular automata transforms, Engineering Ap-plications of Artificial Intelligence, vol.10, pp.589-591, 1997.
-
(1997)
Engineering Ap-plications of Artificial Intelligence
, vol.10
, pp. 589-591
-
-
Lafe, O.E.1
-
16
-
-
80052131108
-
Robust and secure inlm-based 3D watermarking scheme using cellular automata transform
-
S. T. Kim and Y. R. Piao, Robust and secure inlm-based 3D watermarking scheme using cellular automata transform, IJMICS, pp. 1767-1778, 2009.
-
(2009)
IJMICS
, pp. 1767-1778
-
-
Kim, S.T.1
Piao, Y.R.2
-
18
-
-
77950990218
-
Secure multiple image watermarking based on cellular automata
-
J. Jin and H. P. Shu, Secure multiple image watermarking based on cellular automata, Journal of Xidian University (Natural Science), vol.37, no. l, 2010.
-
(2010)
Journal of Xidian University (Natural Science)
, vol.37
, Issue.1
-
-
Jin, J.1
Shu, H.P.2
-
19
-
-
0141909303
-
Blind watermarking method based on DWT middle frequency pair
-
Q. Yuan, H. X. Yao, W. Gao and S. Joo, Blind watermarking method based on DWT middle frequency pair, 2002 IEEE International Conference on Multimedia and Expo, vol.2, pp.473-476, 2002.
-
(2002)
2002 IEEE International Conference on Multimedia and Expo
, vol.2
, pp. 473-476
-
-
Yuan, Q.1
Yao, H.X.2
Gao, W.3
Joo, S.4
-
20
-
-
34548574837
-
Locally optimum detection for barni's multiplicative watermarking in DWT domain
-
J. W. Wang, G. Liu et al., Locally optimum detection for barni's multiplicative watermarking in DWT domain, International Journal of Signal Processing, vol.88, no. l, pp.117-130, 2008.
-
(2008)
International Journal of Signal Processing
, vol.88
, Issue.1
, pp. 117-130
-
-
Wang, J.W.1
Liu, G.2
-
21
-
-
70350437522
-
A DWT-based image watermarking algorithm
-
D. Huangn, J. Liu, J. Huang and H. Liu, A DWT-based image watermarking algorithm, ICME, pp.313-316, 2001.
-
(2001)
ICME
, pp. 313-316
-
-
Huangn, D.1
Liu, J.2
Huang, J.3
Liu, H.4
|