Publisher
Springer Science and Business Media LLC
Reference94 articles.
1. Divya V, Sudha S, Resmy V (2012) Simple and secure image encryption. Int J Comput Sci Issues (IJCSI) 9(6):286
2. Pakshwar R, Trivedi VK, Richhariya V (2013) A survey on different image encryption and decryption techniques. Int J Comput Sci Inform Technol 4(1):113–116
3. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715
4. Habutsu T, Nishio Y, Sasase I, Mori S (1991) A secret key cryptosystem by iterating a chaotic map. In Advances in Cryptology—EUROCRYPT’91: Workshop on the theory and application of cryptographic techniques Brighton, UK, April 8–11, 1991, Proceedings 10. Springer, Berlin, Heidelberg, pp 127–140
5. Schwartz C (1991) A new graphical method for encryption of computer data. Cryptologia 15(1):43–46
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献