共 11 条
[1]
Albahrani Ekhlas Abbas, 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT), P22, DOI 10.1109/NTICT.2017.7976129
[2]
A Novel Approach for Speech Encryption: Zaslavsky Map as Pseudo Random Number Generator
[J].
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS,
2016, 93
:816-823
[3]
Liu HJ, 2008, PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, P3016, DOI 10.1109/ICYCS.2008.449
[4]
Audio encryption scheme by confusion and diffusion based on multi-scroll chaotic system and one-time keys
[J].
OPTIK,
2016, 127 (19)
:7431-7438
[5]
Luca A, 2009, ISSCS 2009: INTERNATIONAL SYMPOSIUM ON SIGNALS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS,, P481
[6]
Key extraction in a chaos-based image cipher and wavelet packets
[J].
ADVANCED TOPICS IN OPTOELECTRONICS, MICROELECTRONICS AND NANOTECHNOLOGIES X,
2020, 11718
[7]
Image encryption algorithm using wavelet packets and multiple chaotic maps
[J].
2020 14TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS (ISETC),
2020,
:297-300
[8]
Macovei C, 2020, U POLITEH BUCH SER C, V82, P119
[10]
Chaos and wavelet packets based cryptography targeting practical applications
[J].
2021 44TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP),
2021,
:227-230