Computer Science ›› 2020, Vol. 47 ›› Issue (10): 327-331.doi: 10.11896/jsjkx.190800003
• Information Security • Previous Articles Next Articles
TIAN Jun-feng1,2, PENG Jing-jing1, ZUO Xian-yu1,2,3, GE Qiang1,2,3, FAN Ming-hu1,2
CLC Number:
[1]LIAN S,SUN J,WANG Z.A block cipher based on a suitable use of the chaotic standard map[J].Chaos Soliton Fract,2005,26(1):117-129. [2]MATTHEWS R.On the derivation of chaotic encryption algorithm[J].Cryptologia,1989,13(1):29-42. [3]CHAI X L,GAN Z H.New Bit-level Self-adaptive Color Image Encryption Algorithm Based on Hyperchaotic System[J].Computer Science,2016,43(4):134-139. [4]CAI J,CHEN X,XIANG X D.Substitution permutation net-work structured image encryption algorithm based on chaotic map[J].Computer Science,2014,41(9):158-164. [5]LIU L F,MIAO S X.A new image encryption algorithm based on logistic chaotic map with varying parameter[J].Springer Plus,2016,5(1):1-12. [6]NASIR Q,ABDLRUDHA H H.High security nested PWLCM chaotic map bit-level permutation based image encryption[J].International Journal of Communications,Network and System Sciences,2012,5(9):548-556. [7]XU L,LI Z,LI J,et al.A novel bit-level image encryption algorithm based on chaotic maps[J].Optics and Lasers inEnginee-ring,2016,78:17-25. [8]LI C,LI S,KWOK-TUNG L.Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps[J].Commun.Nonlinear Sci.Numer.Simul.,2011,16:837-843. [9]LI C.Cracking a hierarchical chaotic image encryption algorithm based on permutation[J].Signal Process,2016,118:203-210. [10]WANG X Y,ZHU X Q,WU X J,et al.Image encryption algorithm based on multiple mixed hash functions and cyclic shift[J].Optics and Lasers in Engineering,2018,107:370-379. [11]HUA Z Y,ZHOU Y C,PUN C M,et al.2D sine Logistic modulation map for image encryption[J].Information Sciences,2015,297(10):80-94. [12]HUA Z Y,ZHOU Y C,HUANG H J.Cosine-transform-based chaotic system for image encryption[J].Information Sciences,2019,480:403-419. [13]ZHU S Q,LI J Q,GE G Y.New image encryption algorithm Based on new four-dimensional discrete-time chaotic map[J].Computer Science,2017,44(1):188-193. [14]XU B,SUN Y W,LI Y,et al.Improved Encryption Algorithm Based on High-dimension Chaotic System[J].Journal of Jilin University(Information Science Edition),2012,30(1):12-17. [15]CHENG D S,TAN X,XU Z L,et al.Dimensional Hyper-chaotic System and Bit Decomposition[J].Journal of University of Electronic Science and Technology of China,2018,47(6):906-912. |
[1] | WANG Kun-shu, ZHANG Ze-hui, GAO Tie-gang. Reversible Hidden Algorithm for Remote Sensing Images Based on Hachimoji DNA and QR Decomposition [J]. Computer Science, 2022, 49(8): 127-135. |
[2] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349. |
[3] | ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358. |
[4] | BAN Duo-han, LV Xin, WANG Xin-yuan. Efficient Image Encryption Algorithm Based on 1D Chaotic Map [J]. Computer Science, 2020, 47(4): 278-284. |
[5] | YU Feng,GONG Xin-hui,WANG Shi-hong. Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion [J]. Computer Science, 2020, 47(2): 276-280. |
[6] | WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472. |
[7] | HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos [J]. Computer Science, 2019, 46(11A): 477-482. |
[8] | ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487. |
[9] | ZHU Shu-qin, WANG Wen-hong and LI Jun-qing. Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model [J]. Computer Science, 2018, 45(4): 178-181. |
[10] | WANG Le-le, LI Guo-dong. Double Chaotic Image Encryption Algorithm Based on Run-length Sequence [J]. Computer Science, 2018, 45(11A): 361-366. |
[11] | ZANG Rui, YU Yang. Composite Image Encryption Algorithm Based on Involutory Matrix [J]. Computer Science, 2018, 45(11A): 389-392. |
[12] | WANG Le-le, LI Guo-dong. Double Chaotic Image Encryption Algorithm Based on Fractional Transform [J]. Computer Science, 2018, 45(11A): 393-397. |
[13] | ZHU Shu-qin and LI Jun-qing. Image Encryption Scheme Based on Chaos with Parameter Perturbation [J]. Computer Science, 2017, 44(Z6): 356-360. |
[14] | ZHU Shu-qin, WANG Wen-hong and SUN Zhong-gui. Chosen Plaintext Attack on Image Encryption Algorithm Based on Bit Scrambling and Hyperchaos [J]. Computer Science, 2017, 44(11): 273-278. |
[15] | ZHU Shu-qin, LI Jun-qing and GE Guang-ying. New Image Encryption Algorithm Based on New Four-dimensional Discrete-time Chaotic Map [J]. Computer Science, 2017, 44(1): 188-193. |
|