References
- J.W. Shin, Y. Sook, H.M. Yoo, and D.S. Park, "A Novel Digital Image Protection using Cellular Automata Transform," The Korean Institute of Communications and Information Sciences, Vol. 35, No. 8, pp. 689-696, 2010.
- H.M. Lim, S.H. Lee, and B.G. Kim, "Design and Implementation of The Ubiquitous Computing Environment-Based on Dynamic Smart on/off-line Learner Tracking System," Journal of Korea Multimedia Society, Vol. 14, No. 1, pp. 24-32, 2011. https://doi.org/10.9717/kmms.2011.14.1.024
- C. Sur, Y.H. Park, and K.H. Rhee, "A Multireceiver Certificateless Encryption Scheme and Its Application," Journal of Korea Multimedia Society, Vol. 14, No. 6, pp. 775-784, 2011. https://doi.org/10.9717/kmms.2011.14.6.775
- G. Ateniese, C. Blundo, and A. Santis, "Extended Schemes for Visual Cryptography," Theoretical Computer Science, Vol. 250, Issues 1-2, pp. 143-161, 2001. https://doi.org/10.1016/S0304-3975(99)00127-9
- J. Giesl and K. Vlcek, "Image Encryption based on Strange Attractor," ICGST-GVIP Journal, Vol. 9, Issue 2, pp. 154-162, 2009.
- K.W. Wong, S.H. Kwok, and W.S. Law, "A Fast Image Encryption Scheme based on Chaotic Standard Map," Physics Letters A, Vol. 372, Issue 15, pp. 2645-2652, 2008. https://doi.org/10.1016/j.physleta.2007.12.026
- G. Chen, Y. Mao, and C. Chui, "Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps," Chaos, Solitons & Fractals, Vol. 21, No. 3, pp. 749-761, 2004. https://doi.org/10.1016/j.chaos.2003.12.022
- L. Zhang, X. Liao, and X. Wang, "An Image Encryption Approach based on Chaotic Maps," Chaos, Solitons and Fractals, Vol. 24, Issue 3, pp. 759-765, 2005. https://doi.org/10.1016/j.chaos.2004.09.035
- N.K. Pareek, V. Patidar, and K.K. Sud, "Image Encryption using Chaotic Logistic Map," Image and Vision Computing, Vol, 24, Issue 9, pp. 926-934, 2006. https://doi.org/10.1016/j.imavis.2006.02.021
- Q. Zhou, K.W. Wong, X. Liao, T. Xiang, and Y. Hu, "Parallel Image Encryption Algorithm based on Discretized Chaotic Map," Chaos, Solitons and Fractals, Vol. 38, Issue 4, pp. 1081-1092, 2008. https://doi.org/10.1016/j.chaos.2007.01.034
- T.H. Nam, S.T. Kim, and S.J. Cho, "Image Encryption using Non-linear FSR and Complemented MLCA," Proceeding of 2009 International Conference of Maritime Information and Communication Sciences, Vol. 2, No. 1, pp. 168-171, 2009.
- O. Lafe, Cellular Automata Transforms: Theory and Application in Multimedia Compression, Encryption, and Modeling, Kluwer Academic Publishers Norwell, MA, USA, 2000.
- H.K. Kim, T.H. Nam, S.J. Cho, and S.T. Kim, "A Novel Image Encryption using Complemented MLCA based on NBCA and 2D CAT," The Korean Institute of Communications and Information Sciences, Vol. 36, No. 6, pp. 361-367, 2011. https://doi.org/10.7840/KICS.2011.36C.6.361
Cited by
- Image Encryption Based on One Dimensional Nonlinear Group Cellular Automata vol.18, pp.12, 2015, https://doi.org/10.9717/kmms.2015.18.12.1462