Computer Science ›› 2017, Vol. 44 ›› Issue (12): 94-99.doi: 10.11896/j.issn.1002-137X.2017.12.019
Previous Articles Next Articles
WEI Ya-juan, FAN Jiu-lun and REN Fang
[1] SADKHAN S B,AL-SHERBAZ A,MOHAMMED R S.Chaos based cryptography for voice encryption in wireless communication[C]∥2013 International Conference on Electrical,Communication,Computer,Power,and Control Engineering (ICECCPCE).IEEE,2013:191-197. [2] GANESAN K,MUTHUKUMAR R,MURALI K.Look-up Table Based Chaotic Encryption of Audio Files[C]∥IEEE Asia Pacific Conference on Circuits and Systems,2006(APCCAS 2006).IEEE,2006:1951-1954. [3] ELSHAMY E M,EL-RABAIE E S M,FARAGALLAH O S,et al.Efficient audio cryptosystem based on chaotic maps and double random phase encoding[J].International Journal of Speech Technology,2015,18(4):619-631. [4] WANG X,GUO K.A new image alternate encryption algorithm based on chaotic map[J].Nonlinear Dynamics,2014,76(4):1943-1950. [5] FARAGALLAH O S.Efficient confusion-diffusion chaotic ima-ge cryptosystem using enhanced standard map[J].Signal Image &Video Processing,2015,9(8):1-10. [6] PHILLIPS V J,LEE M H,THOMAS J E.Speech scrambling by the re-ordering of amplitude samples[J].Radio & Electronic Engineer,1971,41(3):99-112. [7] JAYANT N S,COX R V,MCDERMOTT B J,et al.Analog Scramblers for Speech Based on Sequential Permutations in Time and Frequency[J].Bell System Technical Journal,1983,62(1):25-46. [8] LIU J,GAO F,MA H.A Speech Chaotic Encryption Algorithm Based on Network[C]∥International Conference on Intelligent Information Hiding and Multimedia Signal Processing,2008(IIHMSP’08).IEEE,2008:283-286. [9] 吴乐南.数据压缩的原理与应用[M].北京:电子工业出版社,1995(2):33-37. [10] 吴家安.数据压缩技术及应用[M].北京:科学出版社,2009. [11] BRANDENBURG K,STOLL G.ISO/MPEG-1 Audio:A GenericStandard for Coding of High-Quality Digital Audio[J].Journal of Audio Engineering Society,1994,42(10):780-792. [12] LIU L P,ZHANG X F.Image encryption algorithm based on chaos and bit operations[J].Journal of Computer Applications,2013,33(4):1070-1073.(in Chinese) 刘乐鹏,张雪锋.基于混沌和位运算的图像加密算法[J].计算机应用,2013,33(4):1070-1073. [13] FAN J L,ZHANG X F.Piecewise Logistic Chaotic Map and Its Performance Analysis[J].Acta Electronica Sinica,2009,37(4):720-725.(in Chinese) 范九伦,张雪锋.分段Logistic混沌映射及其性能分析[J].电子学报,2009,37(4):720-725. [14] GROSSMANN A,MORLET J.Decomposition of Hardy functions into square integrable wavelets of constant shape[J].Siam Journal on Mathematical Analysis,1984,15(4):723-736. [15] DAUBECHIES I.Ten Lectures on Wavelets[J].Computers in Physics,1992,6(3):1671-1671. [16] MALLAT S G.A Theory for Multiresolution Signal Decomposition:The Wavelet Representation[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,1989,11(7):674-693. [17] XU K,XU J W,BAN X J.Foreacasting of Some Non-StationaryTime Series Based on Wavelet Decomposition[J].Acta Electroni-ca Sinica,2001,29(4):566-568.(in Chinese) 徐科,徐金梧,班晓娟.基于小波分解的某些非平稳时间序列预测方法[J].电子学报,2001,29(4):566-568. [18] 廉士国.多媒体快速加密算法研究[D].南京:南京理工大学,2005:19-20. [19] SRIDHARAN S,DAWSON E,GOLDBURG B M.Speech encryption using discrete orthogonal transforms[C]∥InternationalConference on Acoustics,Speech,& Signal Processing.IEEE,1990:1647-1650. [20] 刘东东.提升移动话音质量(MOS)相关技术研究[D].北京:北京邮电大学,2012. [21] SEYEDZADEH S M,MOOSAVI S M S, MIRZAKUCHAKI S.Using self-adaptive coupled piecewise nonlinear chaotic map for color image encryption scheme[C]∥2011 19th Iranian Con-ference on Electrical Engineering (ICEE).IEEE,2011:1-6. [22] DU R S,SHANG F H,LI Y.Application of compound chaotic mapping in speech encryption algorithm[J].Computer Enginee-ring and Applications,2009,45(7):103-104.(in Chinese) 杜睿山,尚福华,李阳.复合混沌映射在语音加密算法中的应用[J].计算机工程与应用,2009,45(7):103-104. |
No related articles found! |
|