Author:
Torky Mohamed,Hassanein Aboul Ella
Publisher
Springer International Publishing
Reference18 articles.
1. Bhattacharjee, K., Naskar, N., Roy, S., Das, S.: Types, Dynamics, Non-uniformity and Applications. arXiv preprint
arXiv:1607.02291
(2016)
2. Maniccam, S.S., Bourbakis, N.G.: Lossless image compression and encryption using SCAN. Pattern Recogn. 34(6), 1229–1245 (2001)
3. Ping, P., Xu, F., Wang, Z.J.: Image encryption based on non-affine and balanced cellular automata. Sig. Process. 105, 419–429 (2014)
4. Roy, S., Nandi, S., Dansana, J., Pattnaik, P.K.: Application of cellular automata in symmetric key cryptography. In: 2014 International Conference on Communications and Signal Processing (ICCSP), pp. 572–576. IEEE, April 2014
5. Jaberi, A., Ayanzadeh, R., Mousavi, A.S.Z.: Two-layer cellular automata based cryptography. Trends Appl. Sci. Res. 7(1), 68 (2012)