共 44 条
- [2] Ahmad Asma, 2014, International Journal of Computer Network and Information Security, V6, P58, DOI 10.5815/ijcnis.2014.12.07
- [3] Some basic cryptographic requirements for chaos-based cryptosystems [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
- [4] [Anonymous], Digital Image Processing
- [7] Golea N., 2010, IEEE INT C COMPUTER, P1, DOI 10.1109/AICCSA.2010.5586967
- [10] Kashyap N., 2012, Int. J. Mod. Educ. Comput. Sci, V4, P50, DOI [10.5815/ijmecs.2012.03.07, DOI 10.5815/IJMECS.2012.03.07]