Author of the publication

Chaotic image encryption based on circular substitution box and key stream buffer.

, , and . Signal Process. Image Commun., 29 (8): 902-913 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Estimating the Length Distributions of Genomic Micro-satellites from Next Generation Sequencing Data., , , , and . IWBBIO (1), volume 10813 of Lecture Notes in Computer Science, page 461-472. Springer, (2018)Detecting complex indels with wide length-spectrum from the third generation sequencing data., , , , , , , and . BIBM, page 1980-1987. IEEE Computer Society, (2017)A Semi-Supervised Framework for Detecting and Classifying Human Transposon LINE-1 Insertions., , , and . AIM, page 930-936. IEEE, (2019)An image encryption scheme based on constructing large permutation with chaotic sequence., , , and . Comput. Electr. Eng., 40 (3): 931-941 (2014)Chaotic image encryption based on circular substitution box and key stream buffer., , and . Signal Process. Image Commun., 29 (8): 902-913 (2014)Self-embedding fragile watermarking based on DCT and fast fractal coding., , and . Multimedia Tools Appl., 74 (15): 5767-5786 (2015)A hybrid correcting method considering heterozygous variations by a comprehensive probabilistic model., , , , , , , , , and . BMC Genom., (2020)A probabilistic method for identifying rare variants underlying complex traits., , , , and . BMC Genom., 14 (S-1): S11 (2013)A crowdsourcing method for correcting sequencing errors for the third-generation sequencing data., , , , , , , and . BIBM, page 1626-1633. IEEE Computer Society, (2017)A computational method for detecting the associations between multiple loci and phenotypes., , , , , , and . BIBM, page 2182-2189. IEEE Computer Society, (2018)