Author:
Hodeish Mahmoud E.,Bukauskas Linas,Humbe Vikas T.
Reference55 articles.
1. Image encryption using advanced hill cipher algorithm;Acharya;Int. J. Recent Trends Eng.,2009
2. Ahmad, M., Doja, M.N., Beg, M.S., 2018. Security analysis and enhancements of an image cryptosystem based on hyperchaotic system. J. King Saud Univ.-Comput. Information Sci.
3. Adaptive speckle reduction in ultrasound images using fuzzy logic on Coefficient of Variation;Babu;Biomed. Signal Process. Control,2016
4. A Novel Cryptosystem Using Matrix Transformation;Bibhudendra;SPIT-IEEE Colloquium and International Conference,2008
5. Blakley, G.R., 1979, June. Safeguarding cryptographic keys. In Proceedings of the national computer conference (Vol. 48, No. 313).
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献