[1]
K. Rustan, M. Leino and G. Nelson: Data Abstraction and Information Hiding. ACM Transactions on Programming Languages and Systems Vol. 24 (2002), p.491.
DOI: 10.1145/570886.570888
Google Scholar
[2]
A. Sinha and K. Singh: A Techninque for Image Encryption Using Digital signature. Optics Communications Vol. 218 (2003), p.229.
DOI: 10.1016/s0030-4018(03)01261-6
Google Scholar
[3]
T.G. Gao and Z.Q. Chen: Image Encryption Based on a New Total Shuffling Algorithm. Chaos, Solitons & Fractals Vol. 38 (2008), p.213.
DOI: 10.1016/j.chaos.2006.11.009
Google Scholar
[4]
J.K. Jan and Y.M. Tseng: On the Security of Image Encryption Method. Information Processing Letters Vol. 60 (1996), p.261.
Google Scholar
[5]
W. Ding, W. Yan and D. Qi: Digital Image Information Hiding Technology and Its Application Based on Scrambling and Amalgamation. Journal of Image and Graphics Vol. 5 (2000), p.644.
Google Scholar
[6]
J. Zou and X. Tie: Arnord Transformation of Digital Image with Two Dimensions and Its Periodicity. Journal of North China University of Technology Vol. 12 (2000), p.10.
Google Scholar
[7]
B. Schneier: Applied Cryptography - Protocols, Algorithms, and Source Code in C (China Machine Press, China 2000).
Google Scholar
[8]
S.S. Maniccam and N. G Bourbakis: Lossless Image Compression and Encryption Using SCAN. Pattern Recognition Vol. 34 (2001), p.1229.
DOI: 10.1016/s0031-3203(00)00062-5
Google Scholar
[9]
S.J. Li, C.Q. Li, K.T. Lo and G.R. Chen: Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion. IEEE Transactions on Circuits and Systems for Video Technology Vol. 18 (2008), p.228.
DOI: 10.1109/tcsvt.2008.918116
Google Scholar
[10]
J. Fridrich: Image Encryption Based Chaotic Maps. Systems, Man and Cybernetics Computational Cybernetics and Simulation Vol. 2 (1997), p.1105.
DOI: 10.1109/icsmc.1997.638097
Google Scholar
[11]
G.Z. Xiao, M.X. Lu, L. Qin and X.J. Lai: New Field of Cryptography: DNA Cryptography. Chinese Science Bulletin Vol. 51 (2006), p.1413.
DOI: 10.1007/s11434-006-2012-5
Google Scholar
[12]
A. Gehani, T.H. LaBean and J.H. Reif: DNA-based cryptography. Dimacs Scries in Discrete Mathematics & Theoretical Computer Science Vol. 54 (2000), p.233.
DOI: 10.1090/dimacs/054/19
Google Scholar
[13]
C.T. Celland: Hiding Messages in DNA Microdots. Nature Vol. 399 (1999), p.533.
Google Scholar
[14]
M.X. Lu, X.J. Lai, G.Z. Xiao and L. Qin: The symmetrical Encryption Method Based on DNA Technique. Science in China Series E: Technological Sciences Vol. 37 (2007), p.175.
Google Scholar
[15]
Y.L. He: Genetic Engineering (Science Press, China 2008).
Google Scholar
[16]
A. Pingoud and A. Jeltsch: Structure and Function of Type II Restriction Endonucleases. Nucleic Acids Research Vol. 29 (2001), p.3705.
DOI: 10.1093/nar/29.18.3705
Google Scholar
[17]
W.C. Chen, Z.H. Chen, Z.Y. Chen, Z.Q. Qiang and H.X. Qiu: Digital Coding of the Genetic Codes and DNA Sequences in High Dimension Space. ACTA BIOPHYSICA SINCA Vol. 16 (2000), p.760.
Google Scholar