共 28 条
[11]
Furht B., 2003, IEC COMPREHENSIVE RE
[12]
Gaddam S. V. K., 2010, INT J NETW SECURITY, V11, P57
[13]
A new chaotic algorithm for image encryption
[J].
CHAOS SOLITONS & FRACTALS,
2006, 29 (02)
:393-399
[15]
Combining crypto with biometrics effectively
[J].
IEEE TRANSACTIONS ON COMPUTERS,
2006, 55 (09)
:1081-1088
[17]
Lian S., 2008, Multimedia Content Encryption: Techniques and Applications
[19]
McClellan J. H., 1972, IEEE Transactions on Audio and Electroacoustics, VAU20, P66, DOI 10.1109/TAU.1972.1162342
[20]
Cryptographic key generation from voice
[J].
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2001,
:202-213