Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 361-366.
• Information Security • Previous Articles Next Articles
WANG Le-le, LI Guo-dong
CLC Number:
[1] ADLEMAN L M.Molecular Computation of Solutions to Combinatorial Problems [J].Science,1994,266(5187):1021-1024. [2]黄冬梅,耿霞,魏立斐.基于Henon映射的加密遥感图像的安全检索方案[J]. 软件学报,2016,27(7):1729-1740. [3]赵国敏,李国东.基于广义 Henon映射以及CNN超混沌系统图像加密方案[J].信阳师范学院学报(自然科学版),2015,15(1):141-145. [4]黄清梅,李国东.基于CNN超混沌特性对图像加密技术的应用研究 [J].绵阳师范学院学报,2017,2(2):60-66. [5]燕善俊,程德强.一种基于DCT和混沌序列的图像加密算法 [J].徐州工程学院学报(自然科学版),2014,4(4):39-43. [6]梁涛,李华.基于混沌映射和DNA编码的图像加密算法 [J].计算机工程,2014,40(6):70-74. [7]徐兵,袁立.基于改进Logistic混沌映射的数字图像加密算法研究 [J].计算机测量与控制,2014,22(7):165-167. [8]郭伟创,叶瑞松.一种基于猫映射和伯努利移位映射的图像加密算法 [J].汕头大学学报(自然科学版),2015,30(1):13-23. [9]张雪锋,范九伦.一种改进的基于混沌系统的数字图像加密算法 [J].计算机应用研究,2007,24(4):184-186. [10]郑凡,田小建,范文华,等.基于Henon映射的数字图像加密 [J].北京邮电大学学报,2008,31(1):66-70. [11]牛秀龄,陈浩.基于混沌置乱和小波变换的彩色图像加密方法[J].电脑知识与技术,2016,12(11):225-226. [12]韩凤英,李云.利用复合混沌系统的图像加密方案研究与设计[J].电脑知识与技术,2010,6(13):3450-3452. [13]黄婵,曾小龙.基于可逆记忆CA融合时问延迟的图像加密算法研究[J].科学技术与工程,2014,14(3):86-92. [14]孙倩,胡苏.基于改进cat映射与混沌系统的彩色图像快速加密算法 [J].计算机应用研究,2017,34(1):233-237. [15]马俊明,叶瑞松.对“基于改进广义cat映射的彩色卫星图像加密算法”的安全性分析 [J].汕头大学学报(自然科学版),2016,31(2):50-58. [16]LI G D,WANG L LÁ.Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform[J].Visual Computer,2018,1(1):1-11. |
[1] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349. |
[2] | ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358. |
[3] | REN Shuai, WANG Meng, FAN Ao-xiong, GAO Ze, XU Jie, Shahzad KHURRAM, ZHANG Tao. Zero-high-resolution Information Hiding Algorithm for 3D Mesh Model [J]. Computer Science, 2020, 47(7): 328-334. |
[4] | SHANG Jin-yue, BI Xiu-li, XIAO Bin, LI Wei-sheng. Image Forgery Detection Based on DCT Coefficients Hashing [J]. Computer Science, 2020, 47(6): 310-315. |
[5] | BAN Duo-han, LV Xin, WANG Xin-yuan. Efficient Image Encryption Algorithm Based on 1D Chaotic Map [J]. Computer Science, 2020, 47(4): 278-284. |
[6] | YU Feng,GONG Xin-hui,WANG Shi-hong. Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion [J]. Computer Science, 2020, 47(2): 276-280. |
[7] | TIAN Jun-feng, PENG Jing-jing, ZUO Xian-yu, GE Qiang, FAN Ming-hu. Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps [J]. Computer Science, 2020, 47(10): 327-331. |
[8] | WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472. |
[9] | HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos [J]. Computer Science, 2019, 46(11A): 477-482. |
[10] | ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487. |
[11] | ZHU Shu-qin, WANG Wen-hong and LI Jun-qing. Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model [J]. Computer Science, 2018, 45(4): 178-181. |
[12] | ZANG Rui, YU Yang. Composite Image Encryption Algorithm Based on Involutory Matrix [J]. Computer Science, 2018, 45(11A): 389-392. |
[13] | WANG Le-le, LI Guo-dong. Double Chaotic Image Encryption Algorithm Based on Fractional Transform [J]. Computer Science, 2018, 45(11A): 393-397. |
[14] | ZHU Shu-qin and LI Jun-qing. Image Encryption Scheme Based on Chaos with Parameter Perturbation [J]. Computer Science, 2017, 44(Z6): 356-360. |
[15] | LIU Chun-yang, WU Ze-min, HU Lei and LIU Xi. Pedestrian Detection Based on DCT of Multi-channel Feature [J]. Computer Science, 2017, 44(Z11): 221-224. |
|