Database Reference
In-Depth Information
43. Y. Mao and M. Wu. 2006. A joint signal processing and cryptographic
approach to multimedia encryption. IEEE Transactions on Image Processing
15 (7): 2061-2075.
44. Y. Mao. 2003. Research on chaos-based image encryption and water-
marking technology. PhD thesis, Department of Automation, Nanjing
University of Science & Technology, Nanjing, China.
45. J. Daemen and V. Rijmen. 1999. AES proposal: Rijndael. AES algorithm
submission.
46. R. Kusters and M. Tuengerthal. 2009. Universally composable sym-
metric encryption, 2nd IEEE Computer Security Foundations Symposium
(CSF '09), 293-307.
47. H. Jin, Z. Liao, D. Zou, and C. Li. 2008. Asymmetrical encryption based
automated trust negotiation model. 2nd IEEE International Conference on
Digital Ecosystems and Technologies (DEST 2008), 363-368.
48. S. G. Lian, J. Sun, and Z. Wang. 2004. A novel image encryption scheme
based on JPEG encoding. Proceedings of 8th International Conference on
Information Visualization, 217-220.
49. M. V. Droogenbroeck and R. Benedett. 2002. Techniques for a selec-
tive encryption of uncompressed and compressed images. Proceedings of
Advanced Concepts for Intelligent Vision System s (ACIVS), Ghent, Belgium,
90-97, September 9-11.
50. F. Dachselt, K. Kelber, and W. Schwarz. 1997. Chaotic coding and cryp-
toanalysis. Proceedings of IEEE International Symposium on Circuits and
Systems, Hong Kong, 1061-1064, June 9-12.
51. S. Li and X. Zheng. 2002. Cryptanalysis of a chaotic image encryption
method. Proceedings of IEEE International Symposium on Circuits and
Systems (ISCAS) 2:708-711.
52. J. Wei, X. Liao, K. W. Wong, and T. Zhou. 2005. Cryptanalysis of crypto-
system using multiple one-dimensional chaotic maps. Communications in
Nonlinear Science and Numerical Simulation 12: 814-822.
53. L. Kocarev and G. Jakimoski. 2001. Logistic map as a block encryption
algorithm. Physics Letters A 289 (4-5): 199-206.
54. T. Xiang, X. Liao, G. Tang, Y. Chen, and K. W. Wong. 2006. A novel
block cryptosystem based on iterating a chaotic map. Physics Letters A 349
(1-4): 109-115.
55. S. Contini, R. L. Rivest, M. J. B. Robshaw, and Y. L. Yin. 1998. The secu-
rity of the RC6TM block cipher. RSA Laboratories, M. I. T. Laboratory
for Computer Science, version 1.0.
56. M. Salleh, S. Ibrahim, and I. F. Isnin. 2003. Enhanced chaotic image
encryption algorithm based on Baker's map. Proceedings of 2003
International Symposium on Circuits and Systems (ISCAS '03), 2:
508-511.
57. D. Chen. 2009. A feasible chaotic encryption scheme for image.
International Workshop on Chaos-Fractals Theories and Applications
(IWCFTA'09), 172-176.
58. A. Palacios and H. Juarez. 2002. Cryptography with cycling chaos. Physics
Letters A 303 (5-6): 345-351.
Search WWH ::




Custom Search