|
參考文獻
[1] Lin C. F., “Chaos-based 2D Visual Encryption Mechanism for ECG Medical signals,” Horizons in Computer Science Research, Volume 4, Eds: Thomas S. Clary , pp. 205-217, USA, Nova Science Publishers, 2012. [2] Lin C. F., and Wang B. S. H.,” A 2D Chaos-based Visual Encryption Scheme for Clinical EEG Signals,” Journal of Marine Science and Technology, 19(6), 2011, pp.666-672. [3] Lin C. F., Chung C. H., and Lin J. H., “A Chaos-based Visual Encryption Mechanism for Clinical EEG Signals,” Medical & Biological Engineering & Computing, 47(7), pp.757-762, 2009. [4] Lin C. F., Chung C. H., Chen Z. L., Song, C. J. and Wang Z. X., “A Chaos-based Unequal Encryption Mechanism in Wireless Telemedicine with Error Decryption, ” WSEAS Transactions on Systems, Feb, 2008, pp.49-55. [5] Lin C. F., W. Chang T., and Li C. Y., “A Chaos-based Visual Encryption Mechanism in JPEG2000 Medical Images,” J. of Medical and Biological Engineering, 27(3), pp.144-149, 2007. [6] 林進豐和鍾承興, 一種心電圖/腦波圖混沌視覺加密方法與裝置,中華民國發明專利, I 338845, 2011年3月11日至2026年11月9日。 [7] Lin C. F., and Chang C. Y., “Implementation of a Chaos-based Encryption Software for Electroencephalogram Signals,” Advances in ECWAC, vol.1, (MEAEI2011, China), Eds: D. Jin, and S. Lin, pp.147-150, Springer-Verlag, 2012. [8] 密碼學,http://zh.wikipedia.org/wiki/ [9] Yang Bourbakis, M. N. and S. Li., “Data-image-video encryption,” IEEE Potentials, vol.23, pp.28-34, 2004. [10] 混沌理論,http://zh.wikipedia.org/wiki/ [11] Kocarev, L., “Chaos-Based Cryptography : A Brief Overview”, IEEE Circuits and System Magazine , vol.1, pp. 6-21, 2001 . [12] Klomkarn, K., Jansri, A. and Sooraksa, P.,A “Design of Stream Cipher Based on Multi-Chaotic Function”, International Symposium on Communications and Information Technologies , pp.26-29 , 2004. [13] 邏輯映射,http://www.wikilib.com/wiki/ [14] Microsoft Visual Studio,http://zh.wikipedia.org/wiki/ [15] 曹祖聖、蔡文龍,“Microsoft Visual C# 2008基礎必修課”,碁峯資訊股份有限公司 [16] Visual C#,http://msdn.microsoft.com/zh-tw/library/kx37x362.aspx [17] MSDN,http://msdn.microsoft.com/zh-tw/vstudio/default [18] Klomkarn, K., Jansri, A., and Sooraksa, P., “A Design of Stream Cipher Based on Multi-Chaotic Function”, International Symposium on Communications and Information Technologies , pp.26-29 , 2004. [19] Yen, J. C. and Guo, J. I., “A New Chaotic Key-Based Design for Encryption and Decryption”, IEEE International Symposium on Circuits and System, pp. 28-31, 2000. [20] Zou, J., Xiong, C., Qi, D. and Ward, R. K., “The Application of Chaotic Maps in Image Encryption”, IEEE Northeast Workshop on Circuits and Systems ,2005 . [21] Tang, K. W. and Tang, W. K. S., “A Chaos-based Secure Voice Communication System”, IEEE International Conference on Industrial Technology, pp.571-576, 2005. [22] Li, Y., liang, L., Su, Z. and Jiang, J., “A New video Encryption Algorithm for H.264” IEEE Information Conference on Information and Communications Security, pp.1121-1124, 2005. [23] Chen Ching-Kun and Lin Chun-Liang, “Text Encryption Using ECG signals ”IEEE Conference on Industrial Electronics and Applicationsis, pp.1741-1746, 2010. [24] 洪國勝,Microsoft Visual C# 2008程式設計範例教本,旗標出版股份有限公司 [25] Yang, M., Bourbakis, N. and Li, S., “Data-image-video encryption” IEEE Potentials ,vol.23,pp.28-34, 2004. [26] 多字元加密法,http://killerjims.blogspot.com/2008/09/ vigenere-cipher-to-be-or-not-to-be-that.html [27] Pearson's correlation,http://en.wikipedia.org/wiki/ Correlation_and_dependence
|