0px; "> [1] National Bureau of Standards, "Data Encryption Standard", Federal
Information Processing Standards Publication no.46, U.S. Government
Printing Office, Washington, DC (1977).
[2] Anoop, "Public Key Cryptography-Applications algorithm and
mathematical explanations", 2007.
[3] T. Thongpon and K. Sinchai, "Accelerating Asymmetric-key
Cryptography using Parallel-key Cryptographic Algorithm (PCA)", 6th
International Conference on computer and Information Technology,
vol. 2, pp. 812 – 815, 2009.
[4] J. Fridrich, "Symmetric Ciphers Based on Two-dimensional Chaotic
Maps," Int.J. Bifurcation and Chaos, vol. 8, no. 6, pp. 1259–1284, 1998.
[5] Mosa, E., et al. "Encryption of speech signal with multiple secret keys
in time and transform domains." International Journal of Speech
Technology 13.4 (2010): 231-242.
[6] "Advanced Encryption System", Federal Information Processing
Standards Publication 197, 2001.
[7] J. Daemen and V. R. Rijndael, "The advanced encryption standard", Dr.
Dobb’s J. vol. 26, no. 3, pp. 137–139, 2001.
[8] Fu, Chong, et al. "An efficient and secure medical image protection
scheme based on chaotic maps." Computers in biology and medicine
43.8 (2013): 1000-1010.
[9] Elshamy, Ahmed M., et al. "Optical image encryption based on chaotic
baker map and double random phase encoding." Journal of Lightwave
Technology 31.15 (2013): 2533-2539.
; "> [10] Elgazar, Safaa, et al. "Efficient Watermarking of Audio Signals."
Digital Signal Processing 5.12 (2013): 412.
[11] Elshamy, Ahmed M., et al. "Optical image encryption based on chaotic
baker map and double random phase encoding." Journal of Lightwave
Technology 31.15 (2013): 2533-2539.
[12] Y. Zhai, S. Lin and Q. Zhang, "Improving Image Encryption Using
Multi-Chaotic Map", Workshop on Power Electronics and Intelligent
Transportation System, 2008. PEITS '08, pp. 143 – 148, 2-3 August,
2008.
[13] Nassar, S. S., et al. "Multi-level Security Technique Using
Steganography with Chaotic Encryption." Digital Image Processing 6.3
(2014): 142-148.
[14] Chen, Jun-Xin, et al. "Cryptanalysis and improvement of an optical
image encryption scheme using a chaotic Baker map and double
random phase encoding." Journal of Optics 16.12 (2014): 125403.
[15] Wang, Xingyuan, and Dapeng Luan. "A novel image encryption
algorithm using chaos and reversible cellular automata."
Communications in Nonlinear Science and Numerical Simulation 18.11
(2013): 3075-3085.
[16] Elhoseny, Heba M., et al. "Chaotic encryption of images in the
fractional Fourier transform domain using different modes of
operation." Signal, Image and Video Processing (2013): 1-12.
[17] G. Manjunath and G. V. Anand, "Speech encryption using circulant
transformations, " Proc. IEEE, Int. Conf. Multimedia and Exp, Vol. 1,
pp. 553-556, August, 2002.
[18] P. Hedelin, F. Norden, F and J. Skoglund, "SD optimization of spectral
coders", IEEE Workshop on Speech Coding Proceedings, pp. 28 – 30,
1999.
[19] S. Wang, A. Sekey, A. Gersho, "An objective measure for predicting
subjective quality of speech coders", IEEE Journal on selected areas in
communication, Vol. 10, No. 5, pp. 819-829, June 1992.
[20] W. Yang, M. Benbouchta, R. Yantorno, "Performance of the modified
bark spectral distortion as an objective speech quality measure", Proc.
IEEE International Conference on Acoustic, Speech and Signal
Processing, Vol. 1, Washington, USA , pp. 541-544. May 1998.
[21] W. K. Sang, G. K. Young and M. K. Simon, "Generalized selection
combining based on the log-likelihood ratio", IEEE International
Conference on Communications ICC 2003, vol. 4, pp. 2789-2794,
2003.
[22] J. K. Kwon, S. Park, D. K. Sung, "Collision mitigation by loglikelihood ratio (LLR) conversion in orthogonal code-hopping