Author:
Ismail I. A.,Amin Mohammed,Diab Hossam
Publisher
Zhejiang University Press
Reference10 articles.
1. Barr, T.H., 2002. Invitation to Cryptography. Prentice Hall.
2. Chen, G., Mao, Y., Chui, C.K., 2004. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Soliton & Fractals, 21(3):749–761. [doi:10.1016/j.chaos.2003.12.022]
3. Elkamchouchi, H., Makar, M.A., 2005. Measuring Encryption Quality of Bitmap Images Encrypted with Rijndael and KAMKAR Block Ciphers. Proc. Twenty Second National Radio Science Conference (NRSC 2005), Cairo, Egypt.
4. Lerma, M.A., 2005. Modular Arithmetic. Http://www.math.northwestern.edu/:_mlerma/problem_solving/results/modular_arith.pdf .
5. Li, S., Zheng, X., 2002. On the Security of an Image Encryption Method. ICIP2002. Http://www.hooklee.com/Papers/ICIP2002.pdf .
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献