Author:
Purswani Juhi,Rajagopal Rajesh,Khandelwal Riya,Singh Anuraj
Reference12 articles.
1. T. Graepel, K. Lauter, M. Naehrig, ML Confidential: Machine Learning on Encrypted Data, Information Security and Cryptology ICISC 2012. ICISC 2012 (2013)
2. M. Abadi, D.G. Andersen, Learning to Protect Communications with Adverserial Neural Cryptography, Google Brain, October 24, (2016)
3. J. Fridrich, Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos
4. A. Akhavan, A. Samsudin, A. Akhshani, A symmetric image encryption scheme based on combination of nonlinear chaotic maps. J. Frankl. Inst. 1797–1813 (2011)
5. M. Chauhan, R. Prajapati, Image encryption using chaotic based artificial neural network, Int. J. Sci. Eng. Res. (2014)
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献