Citation to this article as recorded by
Harit, S.K., S.K. Saini, N. Tyagi and K.K. Mishra, 2012. RSA threshold signature based node eviction in vehicular ad hoc network. Inform. Technol. J., 11: 980-988. CrossRefDirect Link |
Jaberi, A., R. Ayanzadeh and A.S.Z. Mousavi, 2012. Two-layer cellular automata based cryptography. Trends Applied Sci. Res., 7: 68-77. CrossRefDirect Link |
Luo, H., Z. Zhao and Z.M. Lu, 2011. Joint secret sharing and data hiding for block truncation coding compressed image transmission. Inform. Technol. J., 10: 681-685. CrossRefDirect Link |
Praveenkumar, P., G. Ashwin, S.P.K. Agarwal, S.N. Bharathi, V.S. Venkatachalam, K. Thenmozhi and R. Amirtharajan, 2014. Rubik's cube blend with logistic map on RGB: A way for image encryption. Res. J. Inform. Technol., 6: 207-215. CrossRefDirect Link |
Zhao, Z. and H. Luo, 2012. Reversible data hiding based on Hilbert curve scan and histogram modification. Inform. Technol. J., 11: 209-216. CrossRefDirect Link |
Citation to this article as recorded by
Joint Secret Sharing and Data Hiding for Block Truncation Coding Compressed Image Transmission Information Technology Journal Vol. 10, Issue 3, 681, 2011 |
Reversible Data Hiding Based on Hilbert Curve Scan and Histogram Modification Information Technology Journal Vol. 11, Issue 2, 209, 2012 |
Two-layer Cellular Automata Based Cryptography Trends in Applied Sciences Research Vol. 7, Issue 1, 68, 2012 |
How to cite this article
Hao Luo, Fa-Xin Yu, Hui Li and Zheng-Liang Huang, 2010. Color Image Encryption Based on Secret Sharing and Iterations. Information Technology Journal, 9: 446-452.
DOI: 10.3923/itj.2010.446.452
URL: https://scialert.net/abstract/?doi=itj.2010.446.452
DOI: 10.3923/itj.2010.446.452
URL: https://scialert.net/abstract/?doi=itj.2010.446.452