共 28 条
- [11] Furht B., 2003, IEC COMPREHENSIVE RE
- [12] Gaddam S. V. K., 2010, INT J NETW SECURITY, V11, P57
- [13] A new chaotic algorithm for image encryption [J]. CHAOS SOLITONS & FRACTALS, 2006, 29 (02) : 393 - 399
- [14] A new image encryption algorithm based on hyper-chaos [J]. PHYSICS LETTERS A, 2008, 372 (04) : 394 - 400
- [15] Combining crypto with biometrics effectively [J]. IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (09) : 1081 - 1088
- [17] Lian S., 2008, Multimedia Content Encryption: Techniques and Applications
- [19] McClellan J. H., 1972, IEEE Transactions on Audio and Electroacoustics, VAU20, P66, DOI 10.1109/TAU.1972.1162342
- [20] Cryptographic key generation from voice [J]. 2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 202 - 213