Author of the publication

Robust video encryption for H.264 compressed bitstream based on cross-coupled chaotic cipher.

, , , , , and . Multim. Syst., 26 (4): 363-381 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weighted voxel: a novel voxel representation for 3D reconstruction., , , , and . ICIMCS, page 33:1-33:4. ACM, (2018)Image compression and encryption algorithm based on compressive sensing and nonlinear diffusion., , , and . Multim. Tools Appl., 80 (17): 25433-25452 (2021)A novel method of dynamic S-box design based on combined chaotic map and fitness function., , , and . Multim. Tools Appl., 79 (17-18): 12329-12347 (2020)A novel hyperchaotic encryption algorithm for color image utilizing DNA dynamic encoding and self-adapting permutation., , , and . Multim. Tools Appl., 81 (15): 21779-21810 (2022)A Centralized Key Management Scheme Based on McEliece PKC for Space Network., , , , and . IEEE Access, (2020)Cluster space key management scheme based on threshold secret sharing and bilinear pairing., , , , , and . Int. J. Satell. Commun. Netw., 39 (6): 686-704 (2021)Dynamical Analysis and Homogenization Process of Unimodal Chaotic Mapping Utilized for Pseudo-Random Sequences., , , , and . Int. J. Bifurc. Chaos, 28 (14): 1850172:1-1850172:14 (2018)Joint Lossless Image Compression and Encryption Scheme Based on CALIC and Hyperchaotic System., , , and . Entropy, 23 (8): 1096 (2021)Detection, Location, and Classification of Multiple Dipole-like Magnetic Sources Based on L2 Norm of the Vertical Magnetic Gradient Tensor Data., , , and . Sensors, 23 (9): 4440 (2023)WSN中考虑负载均衡的贪婪寻优中继节点布局算法的研究 (Research on Relay Node Placement Considering Load Balancing Based on Greedy Optimization Algorithm in Wireless Sensor Networks)., , and . 计算机科学, 42 (6): 115-119 (2015)