1 |
S.T.Kim, Y.R.Piao, "Robust and Secure InIm-based 3D Watermarking Scheme using Cellular Automata Transform", IJMICS, pp.1767-1778, 2009.
|
2 |
B. Viher, A. Dobnikar and D. Zazula, "CA and Follicle Recognition problem and Possibilities of using CA for Image Recognition Purposes", International Journal of Medical Informatics, pp.231-241, 1998.
|
3 |
S. Nandi, B.KKar and P.P. Chaudhuri, "Theory and application of cellular automata", Proc.IEE, Stevenage, U.K., Vol.137, pp.81-87, Jan.1990.
|
4 |
S.J.Cho, U.S.Choi and Y.H.Hwangi, "Computing phase shifts of Maximum-Length 90/150 cellular automata sequences", lecture notes in computer science, pp.31-39, Oct.2004.
|
5 |
T.H. Nam, S.T. Kim and S.J. Cho, "image encryption using Nonlinear FSR and complemented MLCA", 2009 international conference of maritime information and communication science, Vol.2, No.1, pp.168-171, Jun.2009.
|
6 |
Olu Lafe, "Cellular Automata Transforms: Theory and Application in Multimedia Compression, Encryption, and Modeling", Kluwer Academic Publishers, Boston/Dordrecht/London, pp.581-591, 1997.
|
7 |
T.L.Booth, "Sequential Machines and Automata Theory", London, 1967.
|