4.7 Article

A fast double-keyed authenticated image encryption scheme using an improved chaotic map and a butterfly-like structure

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Engineering, Electrical & Electronic

A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map

Chun Cao et al.

SIGNAL PROCESSING (2018)

Article Engineering, Electrical & Electronic

Integrated chaotic systems for image encryption

Rushi Lan et al.

SIGNAL PROCESSING (2018)

Article Engineering, Mechanical

An image encryption scheme based on chaotic tent map

Chunhu Li et al.

NONLINEAR DYNAMICS (2017)

Article Engineering, Electrical & Electronic

Medical image encryption using edge maps

Weijia Cao et al.

SIGNAL PROCESSING (2017)

Article Computer Science, Artificial Intelligence

Image encryption by chaos mixing

Yannick Abanda et al.

IET IMAGE PROCESSING (2016)

Article Computer Science, Information Systems

Image encryption using 2D Logistic-adjusted-Sine map

Zhongyun Hua et al.

INFORMATION SCIENCES (2016)

Article Computer Science, Information Systems

SVD-based self-embedding image authentication scheme using quick response code features

Wen-Chuan Wu et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2016)

Article Optics

A fast image encryption algorithm based on chaotic map

Wenhao Liu et al.

OPTICS AND LASERS IN ENGINEERING (2016)

Article Computer Science, Artificial Intelligence

A novel image encryption algorithm based on chaos and Line map

Guomin Zhou et al.

NEUROCOMPUTING (2015)

Article Engineering, Electrical & Electronic

Efficient confusion-diffusion chaotic image cryptosystem using enhanced standard map

Osama S. Faragallah

SIGNAL IMAGE AND VIDEO PROCESSING (2015)

Article Computer Science, Artificial Intelligence

Highly secured chaotic block cipher for fast image encryption

J. S. Armand Eyebe Fouda et al.

APPLIED SOFT COMPUTING (2014)

Editorial Material Computer Science, Information Systems

Authenticated Encryption: Toward Next-Generation Algorithms

Diana Maimut et al.

IEEE SECURITY & PRIVACY (2014)

Article Computer Science, Software Engineering

A new chaotic map based image encryption schemes for several image formats

Miao Zhang et al.

JOURNAL OF SYSTEMS AND SOFTWARE (2014)

Article Engineering, Electrical & Electronic

A novel reversible image authentication scheme for digital images

Chun-Chi Lo et al.

SIGNAL PROCESSING (2014)

Article Mathematics, Applied

An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion

Wei Zhang et al.

COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2013)

Article Computer Science, Information Systems

Local Shannon entropy measure with statistical tests for image randomness

Yue Wu et al.

INFORMATION SCIENCES (2013)

Article Computer Science, Information Systems

An adaptive image authentication scheme for vector quantization compressed image

Jun-Chou Chuang et al.

JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION (2011)

Article Computer Science, Artificial Intelligence

An image authentication method by applying Hamming code on rearranged bits

Chi-Shiang Chan

PATTERN RECOGNITION LETTERS (2011)

Article Mathematics, Applied

A fast image encryption and authentication scheme based on chaotic maps

Huaqian Yang et al.

COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION (2010)

Article Computer Science, Theory & Methods

Image Encryption With Multiorders of Fractional Fourier Transforms

Ran Tao et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2010)

Article Mathematics, Interdisciplinary Applications

Cryptanalysis of a computer cryptography scheme based on a filter bank

David Arroyo et al.

CHAOS SOLITONS & FRACTALS (2009)

Article Mathematics, Applied

The higher order Schwarzian derivative: Its applications for chaotic behavior and new invariant sufficient condition of chaos

G. Hacibekiroglu et al.

NONLINEAR ANALYSIS-REAL WORLD APPLICATIONS (2009)

Article Engineering, Electrical & Electronic

Image encryption for secure Internet multimedia applications

PP Dang et al.

IEEE TRANSACTIONS ON CONSUMER ELECTRONICS (2000)