Author:
Ahmad Musheer,Doja M. N.,Beg M. M. Sufyan
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Software
Reference37 articles.
1. Furht, B., & Kirovski, D. (2006). Multimedia encryption and authentication techniques and applications. Boca Raton: CRC Press.
2. Gonçalves, D. D. O., & Costa, D. G. (2015). A survey of image security in wireless sensor networks. Journal of Imaging, 1(1), 4–30.
3. Ye, G. (2010). Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognition Letters, 31(5), 347–354.
4. Huang, C. K., & Nien, H. H. (2009). Multi chaotic systems based pixel shuffle for image encryption. Optics Communications, 282(11), 2123–2127.
5. Huang, C. K., Liao, C. W., Hsu, S. L., & Jeng, Y. C. (2013). Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommunication Systems, 52(2), 563–571.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献