Author:
Abdelfatah Roayat Ismail,Nasr Mohamed E.,Alsharqawy Mohammed A.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference22 articles.
1. Sheela S and Sathyanarayana SV (2016) Application of chaos theory in data security-a survey, Accents Transactions on Information Security, proceedings of National Workshop on Cryptology, Vol 2(5), pp: 1–15
2. Hua Z and Zhou Y (2016) Image encryption using 2D logistic-adjusted-sine map, Inf Sci, Elsevier, 339, pp: 237–253
3. Wu Y, Yang G, Jin H and Noonan JP (2012) Image Encryption using the Two-dimensional Logistic Chaotic Map, Journal of Electronic Imaging, Vol. 21, Iss. 1
4. Rostami MJ, Shahba A, Saryazdi S and Nezamabadi-Pour H (2017) A novel parallel image encryption with chaotic windows based on logistic map, Computers and Electrical Engineering, Elsevier, Vol. 62, pp: 384–400
5. Huang X (2012) Image Encryption Algorithm Using Chaotic Chebyshev Generator. An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems, Springer 67(4):2411–2417
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献