Author:
Tang Zhenjun,Zhang Xianquan,Lan Weiwei
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference28 articles.
1. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16(8):2129–2151
2. Ginesu G, Giusto DD, Onali T (2006) Wavelet domain scrambling for image-based authentication. In: Proc. of International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 313–316
3. Hermassi H, Belazi A, Rhouma R, Belghith SM (2013) Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimed Tools Appl. doi: 10.1007/s11042-013-1533-6
4. Monga V, Evans BL (2006) Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Proc 15(11):3452–3465
5. Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vision Comput 24(9):926–934
Cited by
75 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献