Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 7
Page No. 1707 - 1712

A Novel Approach for Image Encryption Using M-J Set

Authors : Yagyesh Godiyal, Ashish Negi and Deepak Negi

References

Agarwal, S. and A. Negi, 2014. A key agreement protocol based on superior fractal sets. J. Math. Comput. Sci., 4: 471-478.
Direct Link  |  

Al-Saidi, N.M. and M.S. Rushdan, 2009. Using IFS as an encryption method. Proceedings of the International Conference on Education Technology and Computer (ICETC'09), April 17-20, 2009, IEEE, Singapore, ISBN:978-0-7695-3609-5, pp: 275-278.

Alia, M. and A. Samsudin, 2007. A new public-key cryptosystem based on mandelbrot and julia fractal sets. Asian J. Inf. Technol., 6: 567-575.
Direct Link  |  

Alia, M. and A. Samsudin, 2007. New key exchange protocol based on Mandelbrot and Julia fractal sets. Intl. J. Comput. Sci. Netw. Secur., 7: 302-307.
Direct Link  |  

Alia, M.A. and A.B. Samsudin, 2017. Generalized scheme for fractal based digital signature (GFDS). Intl. J. Comput. Sci. Netw. Secur., 7: 99-104.

Buchmann, J., 2004. Introduction to Cryptography. 2nd Edn., Springer, USA., ISBN: 978-0-387-21156-5, Pages: 335.

Falconer, K., 2004. Fractal Geometry: Mathematical Foundations and Applications. 2nd Edn., John Wiley & Sons, Hoboken, New Jersey, USA., Pages: 329.

Kocarev, L. and Z. Tasev, 2003. Public-key encryption based on Chebyshev maps. Proceedings of the 2003 International Symposium on Circuits and Systems (ISCAS'03) Vol. 3, May 25-28, 2003, IEEE, Bangkok, Thailand, pp: 3-3.

Lock, A.J.J., C.H. Loh, S.H. Juhari and A. Samsudin, 2010. Compression-encryption based on fractal geometric. Proceedings of the 2nd International Conference on Computer Research and Development, May 7-10, 2010, IEEE, Kuala Lumpur, Malaysia, ISBN:978-0-7695-4043-6, pp: 213-217.

Mandelbrot, B.B., 1967. How long is the coast of Britain? Statistical self-similarity and fractal dimension. Science, 156: 636-638.
Direct Link  |  

Mandelbrot, B.B., 1982. The Fractal Geometry of Nature. W. H. Freeman and Company, ‎New York, USA., ISBN:9780716711865, Pages: 468.

Menezes, A.J., P.C.V. Oorschot and S.A. Vanstone, 1996. Handbook of Applied Cryptography. CRC Press, Boca Raton, USA., ISBN-13:978-0-84-938523-0, Pages: 755.

Peitgen, H.O. and P.H. Richter, 2013. The Beauty of Fractals: Images of Complex Dynamical Systems. Springer, Berlin, Germany, ISBN-13:978-3-642-61719-5, Pages: 197.

Rozouvan, V., 2009. Modulo image encryption with fractal keys. Opt. Lasers Eng., 47: 1-6.
CrossRef  |  Direct Link  |  

Seberry, J. and J. Pieprzyk, 1989. Cryptography: An Introduction to Computer Security. 2nd Edn., Prentice-Hall, Inc., Upper Saddle River, New Jersey, USA., ISBN:9780724802746, Pages: 375.

Stallings, W. and M.P. Tahiliani, 2014. Cryptography and Network Security: Principles and Practice. Pearson, London, UK.,.

Stinson, D.R., 2005. Cryptography: Theory and Practice. 3rd Edn., CRC Press, Boca Raton, Florida, USA., ISBN:978-1-58488-508-5, Pages: 583.

Sun, Y., L. Chen, R. Xu and R. Kong, 2014. An image encryption algorithm utilizing Julia sets and Hilbert curves. PloS. One, 9: e84655-1-e84655-9.
PubMed  |  Direct Link  |  

Sun, Y.Y., R.Q. Kong, X.Y. Wang and L.C. Bi, 2010. An image encryption algorithm utilizing Mandelbrot set. Proceedings of the International Workshop on Chaos-Fractals Theories and Applications (IWCFTA’10), October 29-31, 2010, IEEE, Kunming, Yunnan, China, ISBN:978-1-4244-8815-5, pp: 170-173.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved