共 11 条
[1]
El Abbadi N.K., Mohamad A., Abdulhameed M., Image encryption based on singular value decomposition [J], Journal of Computer Science, 10, 7, pp. 1222-1230, (2014)
[2]
Naskar P.K., Chaudhuri A., Chaudhuri A., A secure symmetric image encryption based on linear geometry [C], 2014 Applications and Innovations in Mobile Computing, pp. 67-74, (2014)
[3]
Ye R.S., Zeng S.J., Lun P.Q., Et al., An image encryption scheme based on bit circular shift and bidirectional diffusion [J], International Journal of Information Technology and Computer Science, 6, 1, pp. 82-92, (2014)
[4]
Kr N.P., Chaudhuri A., A secure symmetric image encryption based on bit-wise operation [J], International Journal of Image, Graphics and Signal Processing, 6, 2, pp. 30-38, (2014)
[5]
Chen J.X., Zhu Z.L., Liu Z.J., Et al., A novel doubleimage encryption scheme based on cross-image pixel scrambling in gyrator domains [J], Optics Express, 22, 6, pp. 7349-7361, (2014)
[6]
Alghamdi A.S., Ullah H., A secure Iris image encryption technique using bio-chaotic algorithm [J], International Journal of Computer and Network Security, 2, 4, pp. 78-84, (2010)
[7]
Alghamdi A.S., Ullah H., Mahmud M., Et al., Bio-chaotic stream cipher-based Iris image encryption [C], 2009 International Conference on Computational Science and Engineering, pp. 739-744, (2009)
[8]
Sun Y.Y., Chen L.N., Xu R.D., Et al., An image encryption algorithm utilizing Julia sets and Hilbert curves [J], PLoS One, 9, 1, (2014)
[9]
Dawahdeh Z.E., Yaakob S.N., Razif Bin Othman R., A new image encryption technique combining Elliptic Curve Cryptosystem with Hill Cipher [J], Journal of King Saud University-Computer and Information Sciences, 30, 3, pp. 349-355, (2018)
[10]
Yasser I., Khalifa F., Mohamed M.A., Et al., A new image encryption scheme based on hybrid chaotic maps [J], Complexity, 2020, pp. 1-23, (2020)