1 |
Priya S S S, KarthigaiKumar P and Mangai N M S et al., "Survey on Efficient, Low-power, AES Image Encryption and Bio-cryptography Schemes,” Smart Computer Review, vol. 2, no. 6, pp. 379-390, December 2012. Article (CrossRef Link)
|
2 |
Mohamed and Faraoun Kamel, "A parallel block-based encryption schema for digital images using reversible cellular automata," Engineering Science and Technology, an International Journal, vol. 17, no. 2, pp. 85-94, 2014. Article (CrossRef Link)
DOI
|
3 |
Wang, Xingyuan, and Dapeng Luan, "A novel image encryption algorithm using chaos and reversible cellular automata," Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 11, pp. 3075-3085, 2014. Article (CrossRef Link)
DOI
|
4 |
Abdo, A. A., et al., "A cryptosystem based on elementary cellular automata," Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 1, pp. 136-147, 2013. Article (CrossRef Link)
DOI
|
5 |
Jin and Jun, "An image encryption based on elementary cellular automata," Optics and Lasers in Engineering, vol. 50, no. 12, pp. 1836-1843, 2012. Article (CrossRef Link)
DOI
|
6 |
Wang, Xingyuan, and Dahai Xu, "A novel image encryption scheme using chaos and Langton’s Ant cellular automaton," Nonlinear Dynamics, vol. 79, no. 4, pp. 2449-2456, 2015. Article (CrossRef Link)
DOI
|
7 |
Zhang, Xiaoyan, et al., "Image encryption scheme based on balanced two-dimensional cellular automata," Mathematical Problems in Engineering. 2013. Article (CrossRef Link)
|
8 |
Ping, Ping, Feng Xu, and Zhi-Jian Wang, "Image encryption based on non-affine and balanced cellular automata," Signal Processing, vol. 105, pp. 419-429, December 2014. Article (CrossRef Link)
DOI
|
9 |
Ping, Ping, Wang Zhi-jian, and Feng Xu, "A Two-Dimensional Cellular Automata Based Method for Multiple Image Encryption," in Proc. of International Conference on Computer Science and Service System (CSSS 2014), pp. 525-528, 2014. Article (CrossRef Link)
|
10 |
Chen, Rong-Jian, and Jui-Lin Lai, "Image security system using recursive cellular automata substitution," Pattern Recognition, vol. 40, no. 5, pp. 1621-1631, 2007. Article (CrossRef Link)
DOI
|
11 |
Zhang, Shuiping, and Huijune Luo, "The research of image encryption algorithm based on chaos cellular automata," Journal of Multimedia, vol. 7, no. 1, pp. 66-73, 2012. Article (CrossRef Link)
|
12 |
del Rey, A. Martín, G. Rodríguez Sánchez, and A. de la Villa Cuenca, "Encrypting digital images using cellular automata," Hybrid Artificial Intelligent Systems. Springer Berlin Heidelberg, pp. 78-88, 2012. Article (CrossRef Link)
|
13 |
Zamani, Samaneh, et al., "A novel image encryption scheme based on hyper chaotic systems and fuzzy cellular automata," in Proc. of Electrical Engineering (ICEE), 2014 22nd Iranian Conference on. IEEE, 2014. Article (CrossRef Link)
|
14 |
Tafti, Ahmad Pahlavan, and Safoura Janosepah, "Digital images encryption in frequency domain based on DCT and one dimensional cellular automata," Informatics Engineering and Information Science. Springer Berlin Heidelberg, pp. 421-427, 2011. Article (CrossRef Link)
|
15 |
Bakhshandeh, Atieh, and Ziba Eslami, "An authenticated image encryption scheme based on chaotic maps and memory cellular automata," Optics and Lasers in Engineering, vol. 51, no. 6, pp. 665-673, 2013. Article (CrossRef Link)
DOI
|
16 |
Wu, Xiaotian, and Wei Sun, "Secret image sharing scheme with authentication and remedy abilities based on cellular automata and discrete wavelet transform," Journal of Systems and Software, vol. 86, no. 4, pp. 1068-1088, 2013. Article (CrossRef Link)
DOI
|
17 |
Chen, Rong-Jian, and Shi-Jinn Horng, "Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata," Signal Processing: Image Communication, vol. 25, no. 6, pp. 413-426, 2010. Article (CrossRef Link)
DOI
|
18 |
Nandi, Subrata, et al., "1-D Group Cellular Automata based Image Encryption Technique," in Proc. of Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2014 International Conference on. IEEE, 2014. Article (CrossRef Link)
|
19 |
Ping, Ping, Feng Xu, and Zhi-Jian Wang, "Color image encryption based on two-dimensional cellular automata," International Journal of Modern Physics C, vol. 24, no. 10, 2013. Article (CrossRef Link)
DOI
|
20 |
Machicao, Jeaneth, Anderson G. Marco, and Odemir Martinez Bruno, "Chaotic encryption method based on life-like cellular automata," Expert Systems with Applications, vol. 39, no. 16, pp. 12626 -12635, 2012. Article (CrossRef Link)
DOI
|
21 |
Zhang, Xing, et al., "A New Public Key Encryption Scheme based on Layered Cellular Automata," KSII Transactions on Internet and Information Systems (TIIS), vol. 8, no. 10, pp. 3572-3590, 2014. Article (CrossRef Link)
DOI
|
22 |
Ayanzadeh, Ramin, et al., "Multi-layer cellular automata for generating normal random numbers," in Proc. of Electrical Engineering (ICEE), 2010 18th Iranian Conference on. IEEE, 2010. Article (CrossRef Link)
|
23 |
Jaberi, Alireza, Ramin Ayanzadeh and Azam S. Zavar Mousavi, "Two-layer cellular automata based cryptography," Trends in applied sciences research, vol. 7, no. 1, pp. 68-77, 2012. Article (CrossRef Link)
DOI
|
24 |
Rao, Chinta Somswara, et al., "Implementation of object oriented encryption system using layered cellular automata," International Journal of Engineering Science and Technology (IJEST), vol. 3, no. 7, 2011. Article (CrossRef Link)
|
25 |
Kari, Jarkko, "Reversibility of 2D cellular automata is undecidable," Cellular Automata: Theory and Experiment, vol. 45, no. 1-3, pp. 379-385, September 1990. Article (CrossRef Link)
|
26 |
Kari, Jarkko, "Reversibility and surjectivity problems of cellular automata," Journal of Computer and System Sciences, vol. 48, no. 1, pp. 149-182, 1994. Article (CrossRef Link)
DOI
|
27 |
Das, Debasis, "A survey on cellular automata and its applications," Global trends in computing and communication systems. Springer Berlin Heidelberg, pp. 753-762, 2012. Article (CrossRef Link)
|
28 |
Xuewen, Xia, et al., "Data encryption based on multi-granularity reversible cellular automata," in Proc. of Computational Intelligence and Security, 2009. CIS'09. International Conference on. Vol. 2. IEEE, pp. 192-196, 2009. Article (CrossRef Link)
|