Author:
Thamanam Srinivasa Rao,Nagaraja Potti,Naik B. Balaji,Manjunathachari K.
Publisher
Springer Science and Business Media LLC
Reference12 articles.
1. EL ABBADI N K, MOHAMAD A, ABDULHAMEED M. Image encryption based on singular value decomposition [J]. Journal of Computer Science, 2014, 10(7): 1222–1230.
2. NASKAR P K, CHAUDHURI A, CHAUDHURI A. A secure symmetric image encryption based on linear geometry [C]//2014 Applications and Innovations in Mobile Computing. Kolkata, India: IEEE, 2014: 67–74.
3. YE R S, ZENG S J, LUN P Q, et al. An image encryption scheme based on bit circular shift and bidirectional diffusion [J]. International Journal of Information Technology and Computer Science, 2014, 6(1): 82–92.
4. KR NASKAR P, CHAUDHURI A. A secure symmetric image encryption based on bit-wise operation [J]. International Journal of Image, Graphics and Signal Processing, 2014, 6(2): 30–38.
5. CHEN J X, ZHU Z L, LIU Z J, et al. A novel doubleimage encryption scheme based on cross-image pixel scrambling in gyrator domains [J]. Optics Express, 2014, 22(6): 7349–7361.