Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 393-397.
• Information Security • Previous Articles Next Articles
WANG Le-le, LI Guo-dong
CLC Number:
[1]ADLEMAN L M.Molecular Computation of Solutions to Combinatorial Problems [J].Science,1994,266(5187):1021-1024. [2]黄冬梅,耿霞,魏立斐.基于Henon映射的加密遥感图像的安全检索方案 [J].软件学报,2016,27(7):1729-1740. [3]赵国敏,李国东.基于广义 Henon映射以及CNN超混沌系统图像加密方案 [J].信阳师范学院学报自然科学版,2015,15(1):141-145. [4]黄清梅,李国东.基于CNN超混沌特性对图像加密技术的应用研究 [J].绵阳师范学院学报,2017,2(2):60-66. [5]谢国波,杨彬.基于比特置乱的量子混沌图像加密算法[J].计算机工程,2017,43(7):182-186. [6]谢国波,王添.基于像素置乱和比特替换的混沌图像加密算法[J].微电子学与计算机,2016,33(3):80-85. [7]徐兵,袁立.基于改进Logistic混沌映射的数字图像加密算法研究[J].计算机测量与控制,2014,22(7):165-167. [8]郭伟创,叶瑞松.一种基于猫映射和伯努利移位映射的图像加密算法[J].汕头大学学报(自然科学版),2015,30(1):13-23. [9]张雪锋,范九伦.一种改进的基于混沌系统的数字图像加密算法[J].计算机应用研究,2007,24(4):184-186. [10]郑凡,田小建,范文华,等.基于Henon映射的数字图像加密[J].北京邮电大学学报,2008,31(1):66-70. [11]韩凤英,李云.利用复合混沌系统的图像加密方案研究与设计[J].电脑知识与技术,2010,6(13):3450-3452. [12]李凯佳,俞锐刚,袁凌云.基于DNA-记忆元胞自动机与Hash函数的图像加密算法 [J].计算机工程与设计,2017,38(2):470-477. [13]廖春成,周小平,廖春龙,等.像素位置与比特双重置乱的混沌图像加密算法 [J].中国科技论文,2014(1):112-116. [14] WANG X Y,WANG T.A novel algorithm for image encryption based on couple chaotic systems [J].International Journal of Modern Physics B,2012,26(30):395. [15]GANESAN K,MURALI K.Image encryption using eight di-mensional chaotic cat map [J].European Physical Journal Special Topics,2014,223(8):1611-1622. [16]CHENG P,YANG H,WEI P,et al.A fast image encryption algorithm based on chaotic map and lookup table [J].Nonlinear Dynamics,2014,79(3):2121-2131. [17]LI G D,WANG L L.Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform[J].Visual Computer,2018,1(1):1-11. |
[1] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349. |
[2] | ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358. |
[3] | REN Shuai, WANG Meng, FAN Ao-xiong, GAO Ze, XU Jie, Shahzad KHURRAM, ZHANG Tao. Zero-high-resolution Information Hiding Algorithm for 3D Mesh Model [J]. Computer Science, 2020, 47(7): 328-334. |
[4] | SHANG Jin-yue, BI Xiu-li, XIAO Bin, LI Wei-sheng. Image Forgery Detection Based on DCT Coefficients Hashing [J]. Computer Science, 2020, 47(6): 310-315. |
[5] | BAN Duo-han, LV Xin, WANG Xin-yuan. Efficient Image Encryption Algorithm Based on 1D Chaotic Map [J]. Computer Science, 2020, 47(4): 278-284. |
[6] | YU Feng,GONG Xin-hui,WANG Shi-hong. Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion [J]. Computer Science, 2020, 47(2): 276-280. |
[7] | TIAN Jun-feng, PENG Jing-jing, ZUO Xian-yu, GE Qiang, FAN Ming-hu. Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps [J]. Computer Science, 2020, 47(10): 327-331. |
[8] | ZHOU Li-jun, LIU Xiao. Low-contrast Crack Detection Method Based on Fractional Fourier Transform [J]. Computer Science, 2019, 46(6A): 208-210. |
[9] | WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472. |
[10] | HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos [J]. Computer Science, 2019, 46(11A): 477-482. |
[11] | ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487. |
[12] | ZHU Shu-qin, WANG Wen-hong and LI Jun-qing. Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model [J]. Computer Science, 2018, 45(4): 178-181. |
[13] | WANG Le-le, LI Guo-dong. Double Chaotic Image Encryption Algorithm Based on Run-length Sequence [J]. Computer Science, 2018, 45(11A): 361-366. |
[14] | ZANG Rui, YU Yang. Composite Image Encryption Algorithm Based on Involutory Matrix [J]. Computer Science, 2018, 45(11A): 389-392. |
[15] | ZHU Shu-qin and LI Jun-qing. Image Encryption Scheme Based on Chaos with Parameter Perturbation [J]. Computer Science, 2017, 44(Z6): 356-360. |
|