Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference57 articles.
1. Acharya T, Ray AK (2005) Image processing: principles and applications. Wiley, New York
2. Akhshani A, Behnia S, Akhavan A, Abu Hassan H, Hassan Z (2010) A novel scheme for image encryption based on 2D piecewise chaotic maps. Opt Commun 283(17):3259–3266
3. Alajel K M, Xiang W, Leis John (2010) Error resilience performance evaluation of h. 264 i-frame and jpwl for wireless image transmission. In: 2010 4th international conference on signal processing and communication systems (ICSPCS). IEEE, pp 1–7
4. Alvarez G, Li S (2009) Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption. Commun Nonlinear Sci Numer Simul 14(11):3743–3749
5. Arroyo D, Li C, Li S, Alvarez G, Halang WA (2009) Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm. Chaos, Solitons Fractals 41(5):2613–2616
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献