Author:
Hashad Fatma G.,Zahran Osama,El-Rabaie El-Sayed M.,Elashry Ibrahim F.,Abd El-Samie Fathi E.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference40 articles.
1. Al-Qassas R, Qasaimeh S, Al-Nouri H (2016) A fingerprint featured data encryption algorithm. The 7th International Conference on Information and Communication Systems (ICICS),
https://doi.org/10.1109/iacs.2016.7476116
2. Cui D (2010) A Novel Fingerprint Encryption Algorithm Based on Chaotic System and Fractional Fourier Transform. International Conference on Machine Vision and Human-Machine Interface.
https://doi.org/10.1109/mvhi.2010.38
3. Garg M, Bansal EH (2013) Fingerprint Recognition System using Minutiae Estimation. International Journal of Application or Innovation in Engineering & Management (IJAIEM) 2(5)
4. Rakesh S, Kaller AA, Shadakshari B, Annappa B (2012) Image Encryption Using Block Based Uniform Scrambling and Chaotic Logistic Mapping. International Journal of Cryptogr Inf Secur (IJCIS) 2(1):49–57
5. Naeem EA, Abd Elnaby MM, Hadhoud MM, Abd El Samie FE (2009) Chaotic image encryption in transform domains. The International Conference on Computer Engineering & Systems (ICCES’09), pp. 288-293
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献