References
- William H. and Matt W., “Information Warfare: Corporate Attack and Defence in a Digital World”, Butterworth-Heinemann, Oxford; 1st edition, 2012.
- Standard, NIST FIPS: “Data Encryption Standard (DES)”, Federal Information Processing Standards Publication, 46-3, 1999.
- Rivest, R. L., Shamir, A. and Adleman, L., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM 21 (2): 120–126, 1978. doi: 10.1145/359340.359342
- NIST, “Secure Hash Standard”, Federal Information Processing Standards Publication, 180-1, 1995.
- Shivani Sharma, Yash Gupta, “Study on Cryptography and Techniques”, International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2(1): 249-252, 2017.
- R. Fujdiak, P. Masek, et al., “Efficiency evaluation of different types of cryptography curves on low-power devices”, 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 269-274, 2015.
- Gurpreet Singh, Supriya, “A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security”, International Journal of Computer Applications, 67(19): 33-38, 2013. doi: 10.5120/11507-7224
- KefaRabah, “Theory and Implementation of Data Encryption Standard: A Review”, Information Technology Journal, 4(4): 307-325, 2005. doi: 10.3923/itj.2005.307.325
- Arpana Kumari and Vivek Kapoor., “Competing secure text encryption in intranet using elliptic curve cryptography”, Journal of Discrete Mathematical Sciences and Cryptography, 23(2): 631-641, 2020. doi: 10.1080/09720529.2020.1729509
- Arpana Kumari and Vivek Kapoor., “Secure Text Encryption in Intranet Using Elliptic Curve Cryptography”, International Journal of Computer Sciences and Engineering, 7(6): 981-984, 2019. doi: 10.26438/ijcse/v7i6.981984
- K. Karhunen, “Uber line are methoden in der Wahrscheinlichkeitsrechnung”, Annales Academiae scientiarum Fennicae. Series A. 1, Mathematica-physica, vol. 37, 1947.
- M. Fleury, et al., “Karhunen-Loeve Transform: An Exercise in Simple Image-Processing Parallel Pipelines”, European Conference on Parallel Processing. Springer, Berlin, Heidelberg, 815-819, 1997.
- P. Soto-Quiros, A. Torokhti, ., “Extended karhunen-loève transform”, 0th International Conference on Telecommunications and Signal Processing, 484-487, 2017.
- Junxiao Li, et al., “Extraction of reflected events from sonic-log waveforms using the Karhunen-Loève transform”, GEOPHYSICS, 82(50): 1SO-Z39, 2017.
- Jae WoongSoh, et al., “An Image Compression Algorithm Based on the KarhunenLòeve Transform”, Asia-Pacific Signal and Information Processing Association Annual Summit and Conference,1436-1439, 2017.
- Hind R. S., et al., “Performance of Data Images Encryption Based Karhunen-Leoeve Transforms”, Research Journal of Applied Sciences, Engineering and Technology, 14(3): 95-100, 2017. doi: 10.19026/rjaset.14.4151
- Satish S. Bhairannawar, et al., “FPGA Implementation of Optimized Karhunen–Loeve Transform for Image Processing Applications”, Journal of Real-Time Image Processing, 17, 357–370, 2018. doi: 10.1007/s11554-018-0776-x
- Subhajit Roy, et al., “Video Steganography Using Karhunen-Loève Transform”, 2nd International Conference on Digital Signal Processing, 142–146, 2018.
- Daniela Stănescu, et al., “Message Processing-based Steganographic Algorithm using Karhunen-Loève Transform”, 23rd International Conference on System Theory, Control and Computing (ICSTCC), 143-148, 2019.
- Hasan Rashaideh, et al., “Real-time image encryption and decryption methods based on the Karhunen-Loeve transform”, International Journal of Intelligent Engineering Informatics, 7(5): 399-421, 2019. doi: 10.1504/IJIEI.2019.103623
- Ramya J. and Somasundareswari D., “KarhunenLoeve Transform with adaptive dictionary learning for coherent and random noise attenuation in seismic data”, Sådhanå, 45: 275-288, 2020. doi: 10.1007/s12046-020-01505-z
- S. Saravanan and Sujitha, “Hybrid medical image compression using the IKLtransform with an efficient encoder”, International Journal of Nonlinear Analysis and Applications, 12(2): 757-767, 2021.
- Claudio Maccone, “A simple introduction to the KLT and BAM-KLT”, In: Mathematical SETI (pp. 411-448), Springer Praxis Books. Springer, Berlin, 2012.