UM
(Note: the search results are based on claimed items)

Browse/Search Results:  1-4 of 4 Help

Filters            
Selected(0)Clear Items/Page:    Sort:
Cascade Chaotic System with Applications Journal article
IEEE Transactions on Cybernetics, 2014,Volume: 45,Issue: 9,Page: 2001
Authors:  Zhou Y.;  Hua Z.;  Pun C.-M.;  Philip Chen C.L.
Favorite | View/Download:13/0 | TC[WOS]:85 TC[Scopus]:0 | Submit date:2018/10/30
Cascade Chaotic System (Ccs)  Chaotic Map  Data Encryption  Pseudo-random Number Generator (Prng)  
A new reversible data hiding algorithm in the encryption domain Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Yi S.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite | View/Download:6/0 | TC[WOS]:0 TC[Scopus]:0 | Submit date:2018/12/21
Differential Attack  Encryption Domain  Reversible Data Hiding  
Image encryption using 2D logistic-sine chaotic map Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, San Diego, CA, OCT 05-08, 2014
Authors:  Hua Z.;  Zhou Y.;  Pun C.-M.;  Chen C.L.P.
Favorite | View/Download:8/0 | TC[WOS]:10 TC[Scopus]:0 | Submit date:2018/12/21
Cascade Chaotic System  Chaotic Map  Data Encryption  Pseudorandom Number Generator (Prng)  
Image encryption using P-Fibonacci transform and decomposition Journal article
Optics Communications, 2012,Volume: 285,Issue: 5,Page: 594
Authors:  Zhou Y.;  Panetta K.;  Agaian S.;  Chen C.L.P.
Favorite | View/Download:22/0 | TC[WOS]:65 TC[Scopus]:0 | Submit date:2018/10/30
Fibonacci P-code Bit-plane Decomposition  Image Encryption  P-fibonacci Transform  Privacy Protection