共 12 条
[1]
Abuhaiba I. S., 2012, International Journal of Computer Network and Information Security, V4, P19
[2]
Ahmad M., 2009, Int. J. Comput. Sci. Eng., V2, P46
[3]
Symmetric ciphers based on two-dimensional chaotic maps
[J].
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS,
1998, 8 (06)
:1259-1284
[4]
Jolfaei Alireza, 2010, Journal of Theoretical and Applied Information Technology, V19, P117
[5]
Mei JS, 2009, 2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, P104
[6]
Peterson G., 1997, ARNOLDS CAT MAP, V45, P1
[7]
Pisarchik A.N., 2010, CHAOTIC MAP CRYPTOGR, V4, P1
[8]
Pradhan C., 2013, INT C COMP INT INF T, P445
[9]
Non Blind Digital Watermarking Technique Using DWT and Cross Chaos
[J].
2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012],
2012, 1
:897-904
[10]
Sethi N., 2012, INT J COMPUT SCI ENG, V1, P115