Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 389-392.
• Information Security • Previous Articles Next Articles
ZANG Rui, YU Yang
CLC Number:
[1]杜长斌.基于JPEG算法的数字图像压缩技术应用研究[D].哈尔滨:黑龙江大学,2013. [2]VAFERI E,SABBAGHI-NADOOSHAN R.A New Encryption Algorithm for Color Images based on Total Chaotic Shuffling Scheme[J].Optik-International Journal for Light and Electron Optics,2015,126(20):2474-2480. [3]KANSO A,GHEBLEH M.An algorithm for encryption of secret images into meaningful images[J].Optics & Lasers in Engineering,2017,90(3):196-208. [4]WIKRAMARATNA R S.The centro-invertible matrix:A new type of matrix arising in pseudo-random number generation[J].Linear Algebra & Its Applications,2011,434(1):144-151. [5]LEBTAHI L,ROMERO O,THOME N.Characterizations of {K,s+1}-potent matrices and applications[J].Linear Algebra & Its Applications,2012,436(2):293-306. [6]CONNELL E H.Elements of Abstract and Linear Algebra[J].American Mathematical Monthly,1999,81(3):301. [7]ASHRAFI N,SHEIBANI M,CHEN H.Certain decompositions of matrices over abelian rings[J].Czechoslovak Mathematical Journal,2017,67(2):1-9. [8]邢坤.二次Arnold变换与中心可逆矩阵研究[D].哈尔滨:东北林业大学,2015. [9]申健,雷菁,李保国,等.一种新型信息隐藏技术的研究与实现[J].通信技术,2013,46(2):100-102. [10]闫伟齐.数字图象信息隐藏中的数学方法及应用研究[D].北京:中国科学院研究生院(计算技术研究所),2001. [11]李用江.数字图像置乱算法的研究[D].西安:西安电子科技大学,2011. |
[1] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349. |
[2] | SHE Wei, HUO Li-juan, TIAN Zhao, LIU Wei, SONG Xuan. Blockchain Covert Communication Model for Plain Text Information Hiding [J]. Computer Science, 2022, 49(1): 345-352. |
[3] | ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358. |
[4] | DONG Xiao-mei, WANG Rui, ZOU Xin-kai. Survey on Privacy Protection Solutions for Recommended Applications [J]. Computer Science, 2021, 48(9): 21-35. |
[5] | HAO Zhi-feng, LIAO Xiang-cai, WEN Wen, CAI Rui-chu. Collaborative Filtering Recommendation Algorithm Based on Multi-context Information [J]. Computer Science, 2021, 48(3): 168-173. |
[6] | REN Shuai, WANG Meng, FAN Ao-xiong, GAO Ze, XU Jie, Shahzad KHURRAM, ZHANG Tao. Zero-high-resolution Information Hiding Algorithm for 3D Mesh Model [J]. Computer Science, 2020, 47(7): 328-334. |
[7] | PENG Wei, HU Ning and HU Jing-Jing. Overview of Research on Image Steganalysis Algorithms [J]. Computer Science, 2020, 47(6A): 325-331. |
[8] | BAN Duo-han, LV Xin, WANG Xin-yuan. Efficient Image Encryption Algorithm Based on 1D Chaotic Map [J]. Computer Science, 2020, 47(4): 278-284. |
[9] | YU Feng,GONG Xin-hui,WANG Shi-hong. Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion [J]. Computer Science, 2020, 47(2): 276-280. |
[10] | TIAN Jun-feng, PENG Jing-jing, ZUO Xian-yu, GE Qiang, FAN Ming-hu. Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps [J]. Computer Science, 2020, 47(10): 327-331. |
[11] | ZHANG Jian-an. Users’ Sensitive Information Hiding Method in Hierarchical Heterogeneous Network Based on Mobile Switching Authentication [J]. Computer Science, 2019, 46(3): 217-220. |
[12] | WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472. |
[13] | HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos [J]. Computer Science, 2019, 46(11A): 477-482. |
[14] | ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487. |
[15] | ZHU Shu-qin, WANG Wen-hong and LI Jun-qing. Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model [J]. Computer Science, 2018, 45(4): 178-181. |
|