Uneingeschränkter Zugang

A Combined Encryption Compression Scheme Using Chaotic Maps


Zitieren

1. A l-Saidi, N., G. Rushdan, M. S d. Using IFS as an Encryption Method. - In: ICET’2009, 275-278.10.1109/ICETC.2009.80Search in Google Scholar

2. Behnia, S., A. Akshani, H. Mahmodi, A. Akhava n. A Novel Algorithm for Image Encryption Based on Mixture of Chaotic Maps. - Chaos Solitons and Fractals, Vol. 35, 2008, No 2, 408-419.10.1016/j.chaos.2006.05.011Search in Google Scholar

3. Celika, M. U., G. Sharma, A. M. Tekalp. Gray-Level-Embedded Lossless Image Compression. - Signal Processing: Image Communication, Vol. 18, 2003, No 6, 443-454.10.1016/S0923-5965(03)00023-7Search in Google Scholar

4. Chen, G., Y. Mao, C. K. Chui. A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps. Chaos, Solitons and Fractals, Vol. 21, 2004, No 3, 749-761.10.1016/j.chaos.2003.12.022Search in Google Scholar

5. Chen, Y., L. Zhang, Y. Wa n g. A Data Encryption Algorithm Based on Dual Chaotic System. - In: International Conference on Computer Application and System Modeling, IEEE, 2010, 431-435.10.1109/ICCASM.2010.5620657Search in Google Scholar

6. Devaney, R. L. A First Course in Chaotic Dynamical Systems: Theory And Experiment. Addison-Wesley, 1992.Search in Google Scholar

7. Dikbas, S., F. Zhai. Lossless Image Compression using Adjustable Fractional Line-Buffer. - Signal Processing, Image Communication, Vol. 25, 2010, No 5, 345-351.10.1016/j.image.2010.02.004Search in Google Scholar

8. Gilbert, J. W. Modern Algebra with Applications. John Wiley and Sons, 1976.Search in Google Scholar

9. Grangetto, M., E. Magli, G. Olmo. Multimedia Selective Encryption by Means of Randomized Arithmetic Coding. - IEEE Trans. Multimedia, Vol. 8, 2006, No 5, 905-917.10.1109/TMM.2006.879919Search in Google Scholar

10. Huang, J., M. Long. A Novel Image Cryptosystem with Multiple Chaotic Maps. - In: Proc. of 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009, 4573-4576.10.1109/WICOM.2009.5302574Search in Google Scholar

11. Kim, H., J. Wen, J. Villasen o r. Secure Arithmetic Coding. - IEEE Trans. Signal Process., Vol. 55, 2007, No 5, 2263-2272.10.1109/TSP.2007.892710Search in Google Scholar

12. May, R. M. Simple Mathematical Models with Very Complicated Dynamics. - Nature, Vol. 261, 1976, No 459, 459-475.10.1038/261459a0934280Search in Google Scholar

13. May, R. M., G. F. Oster. Bifurcations and Dynamic Complexity in Simple Biological Models. - The American Naturalist, Vol. 110, 1976, 573-599.10.1086/283092Search in Google Scholar

14. Pastijn, H. Chaotic Growth with the Logistic Model of P.-F. Verhulst. − In: The Logistic Map and the Route to Chaos: From the Beginnings to Modern Applications. M. Ausloos, M. Dirickx, Eds. Springer-Verlag, 2006.Search in Google Scholar

15. Prasad, B., K. Katiya r. A Comparative Study of Logistic Map through Function Iteration. - In: Proc. Of the Int. Con. Emerging Trends in Engineering and Technology, Kurukshetra, India, 2010, 357-359.Search in Google Scholar

16. Prasad, B., K. Katiya r. Fractals via Ishikawa Iteration. - In: ICLICC2011, P. Balasubramaniam, Ed. Vol. 140. CCIS. Heidelberg, Springer, 2011, 197-203.10.1007/978-3-642-19263-0_24Search in Google Scholar

17. Wang, Y., K. W. Wong, X. Liao, T. Xiang, G. Chen. A Chaos Based Image Encryption Algorithm with Variable Control Parameters Chaos. Chaos Solitons and Fractals, Vol. 41, 2009, No 4, Elsevier, 1773-1783.10.1016/j.chaos.2008.07.031Search in Google Scholar

18. Wong, K. W., C. H. Yuen. Embedding Compression in Chaos-Based Cryptography. - IEEE Trans. Circuits Syst. II, Exp. Briefs, Vol. 55, 2008, No 11, 1193-1197.10.1109/TCSII.2008.2002565Search in Google Scholar

19. Wu, C. P., C. C. J. Kuo. Design of Integrated Multimedia Compression and Encryption Systems. - IEEE Trans. Multimedia, Vol. 7, 2005, No 5, 828-839.10.1109/TMM.2005.854469Search in Google Scholar

20. Xiao, H., S. Qiu, C. Deng. A Composite Image Encryption Scheme Using AES and Chaotic Series. - In: First International Symposium on Data, Privacy and e-Commerce, 2007, 277-279.Search in Google Scholar

21. Yoon, J. W., H. Kim. An Image Encryption Scheme with a Pseudorandom Permutation Based on Chaotic Maps. - Common Nonlinear Sci Numer Simulate, 2010, 3998-4006.10.1016/j.cnsns.2010.01.041Search in Google Scholar

22. Yoon, J. W., H. Kim, J. Villasen o r. Binary Arithmetic Coding with Keybased Interval Splitting. - IEEE Signal Process. Lett., Vol. 13, 2006, No 2, 69-72.10.1109/LSP.2005.861589Search in Google Scholar

23. Zhang, L., X. Liao, X. Wang. An Image Encryption Approach Based on Chaotic Maps. - Chaos, Solitons and Fractals, Vol. 24, 2005, No 3, 759-765.10.1016/j.chaos.2004.09.035Search in Google Scholar

eISSN:
1314-4081
ISSN:
1311-9702
Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
4 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, Informationstechnik