Image Processing Reference
In-Depth Information
References
1. Anoop, S., Alakkaran, A.: A full image encryption scheme based on transform domains
and stream ciphers. International Journal of Advanced Information Science and Technol-
ogy 17(17), 5-10 (2013)
2. Birajdar, G.K., Mankar, V.H.: Digital image forgery detection using passive techniques:
A survey. Digital Investigation 10(3), 226-245 (2013)
3. Bovik, A.C.: The essential guide to image processing. Academic Press (2009)
4. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and
Steganography, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2007)
5. Farid, H.: Image forgery detection. IEEE Signal Processing Magazine 26(2), 16-25
(2009)
6. Golub, G.H., van Van Loan, C.F.: Matrix computations (Johns Hopkins studies in math-
ematical sciences), 3rd edn. The Johns Hopkins University Press (1996)
7. Intel: Sse4 programming reference. D91561 (2007)
8. Jin, J.: An image encryption based on elementary cellular automata. Optics and Lasers
in Engineering (2012)
9. Krikor, L., Shaaban, Z.: Image encryption using DCT and stream cipher. European Jour-
nal of Scientific Research 32(1), 47-57 (2009)
10. Lafe, O.: Data compression and encryption using cellular automata transforms. Engi-
neering Applications of Artificial Intelligence 10(6), 581-591 (1997)
11. Mao, K.: Identifying critical variables of principal components for unsupervised fea-
ture selection. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernet-
ics 35(2), 339-344 (2005)
12. Panda, S.P., Sahu, M., Rout, U.P., Nanda, S.K.: Encryption and decryption algorithm
using two dimensional cellular automata rules in cryptography. International Journal of
Communication Network & Security 1, 18-23 (2011)
13. Pommer, A., Uhl, A.: Selective encryption of wavelet-packet encoded image data: effi-
ciency and security. Multimedia Systems 9(3), 279-287 (2003)
14. Sharma, P., Lal, N., Diwakar, M.: Text security using 2d cellular automata rules. In:
Proceedings of the Conference on Advances in Communication and Control Systems
2013. Atlantis Press (2013)
15. Stallings, W.: Cryptography and Network Security, 3rd edn. Practice Hall (2003)
16. Tafti, A.P., Malakooti, M., Ashourian, M., Janosepah, S.: Digital image forgery detection
through data embedding in spatial domain and cellular automata. In: Int. Conf. on Digital
Content, Multimedia Technology and its Applications (IDCTA), pp. 11-15 (2011)
17. Toffoli, T., Margolus, N.: Cellular Automata Machines: A new environment for mod-
elling. MIT press (1987)
18. Urias, J.: Cryptography primitives based on a cellular automaton. In: Coding Theory,
Cryptography and Related Areas, pp. 244-248 (2000)
19. Van Droogenbroeck, M., Benedett, R.: Techniques for a selective encryption of uncom-
pressed and compressed images. In: Proceedings of the ACIVS Advanced Concepts for
Intelligent Vision Systems (2002)
20. Xiaoyang, Y., Yang, S., Yang, Y., Shuchun, Y., Hao, C., Yanxia, G.: An encryption
method for QR code image based on ECA. International Journal of Security & Its Ap-
plications 7(5) (2013)
Search WWH ::




Custom Search