Author:
Arul Murugan Chinnandi,KarthigaiKumar P.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference23 articles.
1. Naskar PK, Chaudhuri A (2014) A secure symmetric image encryption based on bit-wise operation. Int J Image Graph Sig Process 2:30–38
2. El Abbadi NK, Mohamad A, Abdul-Hameed M (2014) Image Encryption based on singular value decomposition. J Comput Sci 10(7):1222–1230
3. Sun Y, Chen L, Xu R, Kong R (2014) An image encryption algorithm utilizing Julia Sets and Hilbert Curves journals.
plos.org/plosone/article?id=10.1371/journal.pone.0084655
, January 3, 2014
4. Ye R, Zeng S, Lun P, Ma J, Lai C (2014) An Image Encryption Scheme Based on Bit Circular Shift and Bi-directional Diffusion. Int J Inf Tech Comput Sci 6(1):82–92
5. Naskar PK, Chaudhuri A, Chaudhuri A (2014) A secure symmetric image encryption based on linear geometry. Appl Innov Mob Comput (AIMoC):67-74
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献