UM

Browse/Search Results:  1-3 of 3 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization Journal article
Security and Communication Networks, 2015,Volume: 9,Issue: 1,Page: 43-53
Authors:  Yushu Zhang;  Di Xiao;  Kwok-Wo Wong;  Jiantao Zhou;  Sen Bai;  Moting Su
Adobe PDF | Favorite |  | TC[WOS]:3 TC[Scopus]:4 | Submit date:2018/12/22
Arithmetic Coding  Chaotic Map  Joint Compression And Encryption  Perturbation  
Cascade Chaotic System with Applications Journal article
IEEE Transactions on Cybernetics, 2015,Volume: 45,Issue: 9,Page: 2001 - 2012
Authors:  Zhou Yicong;  Hua Zhongyun;  Pun C.-M.;  Philip Chen C.L.
Favorite |  | TC[WOS]:171 TC[Scopus]:197 | Submit date:2018/10/30
Cascade Chaotic System (Ccs)  Chaotic Map  Data Encryption  Pseudo-random Number Generator (Prng)  
2D Sine Logistic modulation map for image encryption Journal article
Information Sciences, 2015,Volume: 297,Page: 80-94
Authors:  Hua Zhongyun;  Zhou Yicong;  Pun C.-M.;  Chen C.L.P.
Favorite |  | TC[WOS]:426 TC[Scopus]:470 | Submit date:2018/10/30
2d Sine Logistic Modulation Map  Chaotic Magic Transform  Image Encryption