|
[1]Jui-Cheng Yen, J. I. Guo, “A New Chaotic Mirror-Like Image Encryption Algorithm and its VLSI Architecture,” Pattern Recognition and Image Analysis, Vol.10, No.2, pp.236-247, 2000. [2]M. Salleh, S. Ibrahim, I.F. Isnin, ”Enhanced chaotic image encryption algorithm based on Baker's map,” IEEE, Proceedings of the 2003 International Symposium on Circuits and Systems, Vol.2, pp.508-511, May 2003. [3]J.-C. Yeo, J.-I Guo, ”Efficient hierarchical chaotic image encryption algorithm and its VLSI realization,” Vision, Image and Signal Processing, IEE Proceedings, Vol.147, pp.167-175, April 2000. [4]Jiri Fridrich, ”Image encryption based on chaotic maps,” IEEE , International Conference on Systems, Man, and Cybernetics, 1'Computational Cybernetics and Simulation', Vol. 2, pp.1105 – 1110, Oct.1997. [5]Jiri Fridrich, ”Symmetric ciphers based on two dimensional chaotic maps,” International Journal of Bifurcation and Chaos (IJBC) in Applied Sciences and Engineering, Vol. 8 , No. 6, 1998. [6]Jui-Cheng Yen, Jiun-In Guo, “A new image encryption algorithm and its VLSI architecture,” Workshop on IEEE Signal Processing Systems, pp.430 – 437, 20-22 Oct. 1999. [7]S. Su, A. Lin, Jui-Cheng Yen, “Design and realization of a new chaotic neural encryption/decryption network,” The 2000 IEEE Asia-Pacific Conference on Circuits and System, pp.335 – 338, 4-6 Dec. 2000. [8]Jui-Cheng Yen, Jiun-In Guo, “A new chaotic key-based design for image encryption and decryption,” The 2000 IEEE International Symposium on Circuits and Systems, Vol. 4, pp.49 – 52, May 2000. [9]Shujun Li, Xuan Zheng, “Cryptanalysis of a chaotic image encryption method,” ISCAS 2002, IEEE International Symposium on Circuits and Systems, Vol. 2, pp.708-711, May 2002. [10]C.J. Kuo, M.S Chen, “A new signal encryption technique and its attack study,” IEEE International Carnahan Conference on Security Technology, pp.149 – 153, Oct. 1991. [11]F. Autrusseau, J. Guedon, “A joint multiple description- encryption image algorithm,” Image Processing, Vol. 3, pp. 269-272, Sept. 2003. [12]P. Verbert, J. Guedon, “N dimensional Mojette transform. Application to Multiple Description,” Digital Signal Processing, Vol. 2, pp.1211-1214, July 2002. [13]Jianhua Wu, Olivier, C.; Chatellier, C.; Poussard, A.-M, “Redundant transformation on the binary data and its applications to image coding and transmission,” IEEE APCCAS 2000, pp. 763-766, Dec 2000. [14]N.J. Shannon “Encryption by random rotations,” in Proc. Workshop on Cryptography, eds. Goos G.,Hartmanis,j. & Feuerstein, B. pp.71-128, 1983. [15]R. Matthews, “On the derivation of a ‘chaotic’ encryption algorithm,” cryptologia XIII(1), pp.29-43, 1989. [16]Chang-Chou Lin, Wen-Hsiang Tsai, “Visual cryptography for gray-level images by dithering techniques,” Pattern Recognition Letters Vol. 24, pp. 349-358, January 2003. [17]Chin-Chen Chang, Jun-Chou Chuang, “An image intellectual property protection scheme for gray-level images using visual secret sharing strategy,” Pattern Recognition Letters Vol. 23, pp.931-941, June 2002. [18]Ren-Junn Hwang, “A Digital Image Copyright Protection Scheme Based on Visual Cryptography,” Thamkang Jourmal of Science and Engineering, Vol. 3, pp. 97-106, 2000. [19]Chi-Kwong Chan, L.M. Cheng,” Hiding data in images by simple LSB substitution,” Pattern Recognition Vol. 37, Issue: 3, pp. 469-474, March 2004. [20]Der-Chyuan Lou, Jiang-Lung Liu,” Steganographic Method for Secure Communications,” Computers and Security Vol. 21, Issue: 5, pp.449-460, 1 October 2002. [21]Ping Wah Wong, N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, Vol. 10, pp. 1593-1601, Oct. 2001. [22]N. Naor, A. Shamir, “Visual Cryptography, Advances in Cryptography: Eurocrypt,“ In: Lecture Note in Computer Science. Springer, Perugia, Italy, pp.1-12, 1994. [23]E. N. Lorenz, “Deterministic Nonperiodic Flow,” Journal of the Atmospheric Sciences, Vol. 20, pp.130-141, 1963. [24]T.S. Parker, L.O. Chua, “Chaos—A Tutorial for Engineers,” Proc. IEEE, Vol. 75(8), pp. 982–1008, 1987. [25]G. Heidari-Bateni, C.D. McGillem, “Chaotic sequences for spread spectrum: an alternative to PN-sequences,” Wireless Communications, pp.437-440, June 1992. [26]S.Neil Rasband, Chaotic Dynamics of Nonlinear Systems, New York, 1992. [27]Yaobin Mao, Guanrong Chen, “Chaos-Based Image Encryption,” Handbook of Computational Geometry for Pattern Recognition,Computer Vision, Neural Computing and Robotics, 2003. [28]Jeanpierre Guedon, Y. Bizais “Band-limited and Haar filtered backprojection reconstructions,” IEEE Transactions on Medical Imaging, Vol. 13, Number 3, pp.430- 440, November 1994. [29]C.-C. Chen, J.S. DaPonte, M.D. Fox,” Fractal feature analysis and classification in medical imaging,” IEEE Transactions on Medical Imaging, Vol. 8, pp.133-142, June 1989. [30]William Stallings, Cryptography And Network Security: Principles and Practice, Upper Saddle River, N.J., 1999.
|