Computer Science ›› 2020, Vol. 47 ›› Issue (4): 278-284.doi: 10.11896/jsjkx.190600059
• Information Security • Previous Articles Next Articles
BAN Duo-han, LV Xin, WANG Xin-yuan
CLC Number:
[1]ZHANG X Q,WANG M M,ZHU G L.Research on the New Development of Image Encryption Algorithms[J].Computer Engineering & Science,2012,34(5):1-6. [2]YE G.Image scrambling encryption algorithm of pixel bit based on chaos map[J].Pattern Recognition Letters,2010,31(5):347-354. [3]LI Y J,ZHANG R Z,GE J H,et al.Periods of the 3-ArnoldTransformation and Its Application in Image Encryption[J].Journal of University of Electronic Science and Technology of China,2015,44(2):289-294. [4]SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613. [5]BLAKLEY G R.Safeguarding cryptographic keys[C]//Proceedings of the National Computer Conference.1979:313-317. [6]TIAN H Q,QUAN J C,CHENG H,et al.A Summarization about Image Information Encryption Techniques[J].Information Science,2009(1):156-160. [7]LI T Y,YORKE J A.Period three implies chaos[J].The American Mathematical Monthly,1975,82(10):985-992. [8]CHEN G,MAO Y,CHUI C K.A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos,Solitons and Fractals,2004,21(3):749-761. [9]ZHOU Y,BAO L,CHEN C L P.A new 1D chaotic system for image encryption[J].Signal Processing,2014,97:172-182. [10]PAK C,HUANG L.A new color image encryption using combination of the 1D chaotic map[J].Signal Processing,2017,138:129-137. [11]ARROYO D,RHOUMA R,ALVAREZ G,et al.On the security of a new image encryption scheme based on chaotic map lattices[J].Chaos:An Interdisciplinary Journal of Nonlinear Science,2008,18(3):033112. [12]SKROBEK A.Cryptanalysis of chaotic stream cipher[J].Physics Letters A,2007,363(1/2):84-90. [13]WANG X,TENG L,QIN X.A novel colour image encryption algorithm based on chaos[J].Signal Processing,2012,92(4):1101-1108. [14]ARROYO D,DIAZ J,RODRIGUEZ F B.Cryptanalysis of a one round chaos-based substitution permutation network[J].Signal Processing,2013,93(5):1358-1364. [15]HUA Z,ZHOU Y,PUN C M,et al.2D Sine Logistic modulation map for image encryption[J].Information Sciences,2015,297:80-94. [16]ZHU C.A novel image encryption scheme based on improved hyperchaotic sequences[J].Optics Communications,2012,285(1):29-37. [17]ÖZKAYNAK F,ÖZER A B,YAVUZ S.Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences[J].Optics Communications,2012,285(24):4946-4948. [18]WEN C C,WANG Q,MIAO X N,et al.Digital Image Encryption:A Survey[J].Computer Science,2012,39(12):6-9. [19]DENG S,ZHAN Y,XIAO D,et al.Analysis and improvement of a hash-based image encryption algorithm[J].Communications in Nonlinear Science and Numerical Simulation,2011,16(8):3269-3278. [20]WANG X,JIN C.Image encryption using game of life permutation and PWLCM chaotic system[J].Optics Communications,2012,285(4):412-417. [21]WOLF A,SWIFT J B,SWINNEY H L,et al.Determining Lyapunov exponents from a time series[J].Physica D:Nonlinear Phenomena,1985,16(3):285-317. [22]ECKMANN J P,RUELLE D.Ergodic theory of chaos andstrange attractors[M]//The Theory of Chaotic Attractors.New York:Springer,1985:273-312. [23]ALVAREZ G,LI S.Some basic cryptographic requirements for chaos-based cryptosystems[J].International Journal of Bifurcation and Chaos,2006,16(8):2129-2151. [24]HUA Z,JIN F,XU B,et al.2D Logistic-Sine-coupling map for image encryption[J].Signal Processing,2018,149:148-161. [25]WU Y,ZHOU Y,SAVERIADES G,et al.Local Shannon entropy measure with statistical tests for image randomness[J].Information Sciences,2013,222:323-342. [26]WU Y,ZHOU Y,NOONAN J P,et al.Design of Image Cipher Using Latin Squares[J].Information Sciences,2014,264:317-339. |
[1] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349. |
[2] | ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358. |
[3] | YU Feng,GONG Xin-hui,WANG Shi-hong. Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion [J]. Computer Science, 2020, 47(2): 276-280. |
[4] | TIAN Jun-feng, PENG Jing-jing, ZUO Xian-yu, GE Qiang, FAN Ming-hu. Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps [J]. Computer Science, 2020, 47(10): 327-331. |
[5] | WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472. |
[6] | HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos [J]. Computer Science, 2019, 46(11A): 477-482. |
[7] | ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487. |
[8] | ZHU Shu-qin, WANG Wen-hong and LI Jun-qing. Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model [J]. Computer Science, 2018, 45(4): 178-181. |
[9] | WANG Le-le, LI Guo-dong. Double Chaotic Image Encryption Algorithm Based on Run-length Sequence [J]. Computer Science, 2018, 45(11A): 361-366. |
[10] | ZANG Rui, YU Yang. Composite Image Encryption Algorithm Based on Involutory Matrix [J]. Computer Science, 2018, 45(11A): 389-392. |
[11] | WANG Le-le, LI Guo-dong. Double Chaotic Image Encryption Algorithm Based on Fractional Transform [J]. Computer Science, 2018, 45(11A): 393-397. |
[12] | ZHU Shu-qin, WANG Wen-hong and SUN Zhong-gui. Chosen Plaintext Attack on Image Encryption Algorithm Based on Bit Scrambling and Hyperchaos [J]. Computer Science, 2017, 44(11): 273-278. |
[13] | ZHU Shu-qin, LI Jun-qing and GE Guang-ying. New Image Encryption Algorithm Based on New Four-dimensional Discrete-time Chaotic Map [J]. Computer Science, 2017, 44(1): 188-193. |
[14] | ZHU Shu-qin, LI Jun-qing and GE Guang-ying. Fast Image Encryption Algorithm Based on Novel Five Dimensional Discrete Chaos [J]. Computer Science, 2016, 43(Z11): 411-416. |
[15] | CHAI Hong-yu and ZANG Hong-yan. Image Encryption Scheme Based on Generalized Chaotic Synchronization Systems [J]. Computer Science, 2016, 43(8): 100-104. |
|