Author:
Ma Lisha,Chen Lei,Wang Shihong
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference26 articles.
1. Ahmad M, AlSharari HD (2017) On the security of chaos-based watermarking scheme for secure communication. In Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, p 313–3212
2. Bouslimi D, Bellafqira R, Coatrieux G (2016) Data hiding in homomorphically encrypted medical images for verifying their reliability in both encrypted and spatial domains. Engineering in Medicine & Biology Society. Conf Proc IEEE Eng Med Biol Soc 2016:2496
3. Chen L, Wang S (2016) Differential cryptanalysis of a medical image cryptosystem with multiple rounds. Comput Biol Med 65:69–75
4. Chen YC, Shiu CW, Horng G (2014) Encrypted signal-based reversible data hiding with public key cryptosystem. J Vis Commun Image Represent 25(5):1164–1170
5. Chen L, Ma B, Zhao X, Wang S (2017) Differential cryptanalysis of a novel image encryption algorithm based on chaos and line map. Nonlinear Dynamics 87(3):1797–1807
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献