UM
(Note: the search results are based on claimed items)

Browse/Search Results:  1-5 of 5 Help

Filters            
Selected(0)Clear Items/Page:    Sort:
Image encryption algorithm based on a new combined chaotic system Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, Seoul, SOUTH KOREA, OCT 14-17, 2012
Authors:  Chen C.L.P.;  Zhang T.;  Zhou Y.
Favorite | View/Download:18/0 | TC[WOS]:3 TC[Scopus]:6 | Submit date:2018/12/21
Chaotic Theory  Combined Chaotic System  Image Encryption  Logistic Map  
A new image encryption algorithm using truncated P-Fibonacci Bit-planes Conference paper
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics, Seoul, SOUTH KOREA, OCT 14-17, 2012
Authors:  Cao W.;  Zhou Y.;  Chen C.L.P.
Favorite | View/Download:12/0 | TC[WOS]:0 TC[Scopus]:1 | Submit date:2018/12/21
Image Encryption  Truncated P-fibonacci Bit-plane  
A new chaotic system for image encryption Conference paper
Proceedings 2012 International Conference on System Science and Engineering, ICSSE 2012, Dalian, Liaoning, China, 30 June-2 July 2012
Authors:  Bao L.;  Zhou Y.;  Chen C.L.P.;  Liu H.
Favorite | View/Download:14/0 | TC[WOS]:0 TC[Scopus]:26 | Submit date:2018/12/21
Chaotic System  Image Encryption  
A pattern recognition system for JPEG steganography detection Journal article
Optics Communications, 2012,Volume: 285,Issue: 21-22,Page: 4252-4261
Authors:  Chen C.L.P.;  Chen M.-C.;  Agaian S.;  Zhou Y.;  Roy A.;  Rodriguez B.M.
Favorite | View/Download:15/0 | TC[WOS]:1 TC[Scopus]:5 | Submit date:2018/12/21
Feature Generation  Feature Ranking And Selection  Pattern Classification  Pattern Recognition System  Steganography Detection  
Image encryption using P-Fibonacci transform and decomposition Journal article
Optics Communications, 2012,Volume: 285,Issue: 5,Page: 594
Authors:  Zhou Y.;  Panetta K.;  Agaian S.;  Chen C.L.P.
Favorite | View/Download:26/0 | TC[WOS]:65 TC[Scopus]:79 | Submit date:2018/10/30
Fibonacci P-code Bit-plane Decomposition  Image Encryption  P-fibonacci Transform  Privacy Protection