References
- J C Yen, and J I Guo, “A New Chaotic Key–Based Design for Image Encryption and Decryption,” Proc. IEEE International Symposium on Circuits and Systems, May 28–31, Geneva, Switzerland, Vol. 4, pp. 49–52, 2000.
- N Masuda, and K Aihara, “Cryptosystems with discretized chaotic maps,” IEEE Trans. on Circuits and Systems -I: Fundamental Theory and Applications, Vol. 49, No. 1, p. 28–40, 2002.
- B Furht, and D Socek. Multimedia security: Encryptiontechniques. In IEC Comprehensive Report on Information Security, International Engineering Consortium, Chicago, IL, p 335–49, 2004.
- S Li, G Chen, and X Zheng. Chaos-based encryption for digital images and videos, in B. Furht and D. Kirovski (Eds.), Multimedia Security Handbook, Vol. 4 of Internet and Communications Series, Ch. 3, CRC Press, United States, Dec. 2004.
- D Socek, S Li, S S Magliveras, and B Furht, “Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption,” Proc. IEEE First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005. Secure Comm 2005, Sep. 2005.
- S Li, and X Zheng, “Cryptanalysis of a Chaotic Image Encryption Method”, ISCAS 2002, Vol. 2, pp. 708–11, 2002.
- K Deergha Rao, and Ch Gangadhar, “Modified chaotic key-based algorithm for image encryption and its VLSI realization” IEEE International Conference on Digital Signal Processing (DSP-2007), Cardiff, Wales, U.K, pp. 439–442, July 1–4, 2007.
- K Deergha Rao, and Ch Gangadhar, “VLSI Realization of a Secure Cryptosystem for Image Encryption and Decryption”, IEEE International Conference on Communications and Signal Processing (ICCSP 2011), NIT Calicut, Kerala, India, 10–12, Feb. 2011.