1 |
J.W. Shin, Y. Sook, H.M. Yoo, and D.S. Park, "A Novel Digital Image Protection using Cellular Automata Transform," The Korean Institute of Communications and Information Sciences, Vol. 35, No. 8, pp. 689-696, 2010.
과학기술학회마을
|
2 |
H.M. Lim, S.H. Lee, and B.G. Kim, "Design and Implementation of The Ubiquitous Computing Environment-Based on Dynamic Smart on/off-line Learner Tracking System," Journal of Korea Multimedia Society, Vol. 14, No. 1, pp. 24-32, 2011.
과학기술학회마을
DOI
|
3 |
C. Sur, Y.H. Park, and K.H. Rhee, "A Multireceiver Certificateless Encryption Scheme and Its Application," Journal of Korea Multimedia Society, Vol. 14, No. 6, pp. 775-784, 2011.
DOI
|
4 |
G. Ateniese, C. Blundo, and A. Santis, "Extended Schemes for Visual Cryptography," Theoretical Computer Science, Vol. 250, Issues 1-2, pp. 143-161, 2001.
DOI
ScienceOn
|
5 |
J. Giesl and K. Vlcek, "Image Encryption based on Strange Attractor," ICGST-GVIP Journal, Vol. 9, Issue 2, pp. 154-162, 2009.
|
6 |
K.W. Wong, S.H. Kwok, and W.S. Law, "A Fast Image Encryption Scheme based on Chaotic Standard Map," Physics Letters A, Vol. 372, Issue 15, pp. 2645-2652, 2008.
DOI
ScienceOn
|
7 |
Q. Zhou, K.W. Wong, X. Liao, T. Xiang, and Y. Hu, "Parallel Image Encryption Algorithm based on Discretized Chaotic Map," Chaos, Solitons and Fractals, Vol. 38, Issue 4, pp. 1081-1092, 2008.
DOI
ScienceOn
|
8 |
G. Chen, Y. Mao, and C. Chui, "Symmetric Image Encryption Scheme based on 3D Chaotic Cat Maps," Chaos, Solitons & Fractals, Vol. 21, No. 3, pp. 749-761, 2004.
DOI
ScienceOn
|
9 |
L. Zhang, X. Liao, and X. Wang, "An Image Encryption Approach based on Chaotic Maps," Chaos, Solitons and Fractals, Vol. 24, Issue 3, pp. 759-765, 2005.
DOI
ScienceOn
|
10 |
N.K. Pareek, V. Patidar, and K.K. Sud, "Image Encryption using Chaotic Logistic Map," Image and Vision Computing, Vol, 24, Issue 9, pp. 926-934, 2006.
DOI
ScienceOn
|
11 |
T.H. Nam, S.T. Kim, and S.J. Cho, "Image Encryption using Non-linear FSR and Complemented MLCA," Proceeding of 2009 International Conference of Maritime Information and Communication Sciences, Vol. 2, No. 1, pp. 168-171, 2009.
|
12 |
O. Lafe, Cellular Automata Transforms: Theory and Application in Multimedia Compression, Encryption, and Modeling, Kluwer Academic Publishers Norwell, MA, USA, 2000.
|
13 |
H.K. Kim, T.H. Nam, S.J. Cho, and S.T. Kim, "A Novel Image Encryption using Complemented MLCA based on NBCA and 2D CAT," The Korean Institute of Communications and Information Sciences, Vol. 36, No. 6, pp. 361-367, 2011.
과학기술학회마을
DOI
|