Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of the RCES/RSES image encryption scheme., , , and . Journal of Systems and Software, 81 (7): 1130-1143 (2008)On the security defects of an image encryption scheme., , , , , and . Image Vision Comput., 27 (9): 1371-1381 (2009)Cryptanalysis of an image encryption scheme based on a compound chaotic sequence., , , and . Image Vision Comput., 27 (8): 1035-1039 (2009)On the Performance of Secret Entropy Coding: A Perspective Beyond Security.. Autonomous Systems: Developments and Trends, volume 391 of Studies in Computational Intelligence, Springer, (2012)Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers., , , and . Chaos-Based Cryptography, volume 354 of Studies in Computational Intelligence, Springer, (2011)Enhanced perceptual image authentication with tamper localization and self-restoration., , , , and . ICME, page 1-6. IEEE Computer Society, (2014)Performance benchmarking of RVC based multimedia specifications., , and . ICIP, page 4569-4573. IEEE, (2013)On the Security of the Yi-Tan-Siew Chaos-Based Cipher, , and . CoRR, (2004)A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS), , , and . CoRR, (2009)Cryptanalysis of a computer cryptography scheme based on a filter bank, , , and . CoRR, (2007)