咨询与建议

限定检索结果

文献类型

  • 4 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 5 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 1 篇 控制科学与工程
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 5 篇 1d logistic map
  • 2 篇 chaos
  • 2 篇 cryptography
  • 2 篇 information entr...
  • 1 篇 3d logistic map
  • 1 篇 feed forward ini...
  • 1 篇 bit-plane decomp...
  • 1 篇 different colour...
  • 1 篇 arnold 2d cat ma...
  • 1 篇 peak-signal-to-n...
  • 1 篇 color image
  • 1 篇 tent maps
  • 1 篇 peak signal to n...
  • 1 篇 image colour ana...
  • 1 篇 perceptual acces...
  • 1 篇 image coding
  • 1 篇 random permutati...
  • 1 篇 key space high
  • 1 篇 diffusion
  • 1 篇 recent decade

机构

  • 1 篇 univ kalyani dep...
  • 1 篇 kiit univ sch co...
  • 1 篇 vellore inst tec...
  • 1 篇 natl inst techno...
  • 1 篇 vellore inst tec...
  • 1 篇 barrackpore rast...
  • 1 篇 techno india col...
  • 1 篇 sastra deemed un...
  • 1 篇 indian stat inst...
  • 1 篇 indian stat inst...
  • 1 篇 barrackpore rast...

作者

  • 2 篇 palit sarbani
  • 2 篇 som sukalyan
  • 1 篇 kabi kunal kumar
  • 1 篇 kaviya k.
  • 1 篇 bisoi ajay kumar
  • 1 篇 thanikaiselvan v
  • 1 篇 dey soumista
  • 1 篇 changder suvamoy
  • 1 篇 saha bidyut jyot...
  • 1 篇 abilash p.
  • 1 篇 pradhan chittara...
  • 1 篇 mahapatra suman
  • 1 篇 chatterjee ayant...
  • 1 篇 subashanthini s.
  • 1 篇 sen sayani
  • 1 篇 barik ram chandr...
  • 1 篇 amirtharajan ren...
  • 1 篇 kotal atanu
  • 1 篇 sathya p. i
  • 1 篇 lingeswar c.

语言

  • 5 篇 英文
检索条件"主题词=1D Logistic Map"
5 条 记 录,以下是1-10 订阅
排序:
Perceptual accessible image encryption scheme conjugating multiple chaotic maps
收藏 引用
IET IMAGE PROCESSING 2020年 第11期14卷 2457-2468页
作者: Barik, Ram Chandra Changder, Suvamoy Natl Inst Technol Dept Comp Sci & Engn Durgapur W Bengal India
In the recent decade, chaos-based image encryption algorithms gained attention due to their pros and cons. The authors suggest one such algorithm of image encryption for different colour space using feed forward initi... 详细信息
来源: 评论
Chaotic Audio Encryption and decryption Using logistic map
Chaotic Audio Encryption and Decryption Using Logistic Map
收藏 引用
IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS)
作者: Thanikaiselvan, V Abilash, P. Lingeswar, C. Sathya, P., I Kaviya, K. Subashanthini, S. Amirtharajan, Rengarajan Vellore Inst Technol Sch Elect Engn Vellore Tamil Nadu India Vellore Inst Technol Sch Comp Sci Engn & Informat Syst SCORE Vellore Tamil Nadu India SASTRA Deemed Univ Sch Elect & Elect Engn Thanjavur India
Chaotic audio encryption and decryption using the logistic map offer a promising avenue for enhancing the security of audio data through the utilization of chaotic dynamics and non-linear cryptography techniques. This... 详细信息
来源: 评论
A Colour Image Encryption Based On dNA Coding and Chaotic Sequences
A Colour Image Encryption Based On DNA Coding and Chaotic Se...
收藏 引用
1st International Conference on Emerging Trends and Applications in Computer Science (ICETACS)
作者: Som, Sukalyan Kotal, Atanu Chatterjee, Ayantika dey, Soumista Palit, Sarbani Barrackpore Rastraguru Surendranath Coll Dept Comp Sci 85 Middle Rd & 6 Riverside Rd Kolkata 120 W Bengal India Techno India Coll Technol Dept Comp Sci & Engn Kolkata 156 W Bengal India Indian Stat Inst Comp Vis & Pattern Recognit Unit Kolkata 108 W Bengal India
in this communication, a Chaos Based Symmetric Key Encryption of RGB Color Images with dNA Coding and a Chaos based Pseudorandom Binary Number Generator (PRBNG) has been proposed. In the proposed algorithm, the plain ... 详细信息
来源: 评论
A Selective Bitplane Based Encryption of Grayscale Images with Tamper detection, Localization and Recovery Based on Watermark  2
A Selective Bitplane Based Encryption of Grayscale Images wi...
收藏 引用
2nd International Conference on Information Systems design and Intelligent Applications (INdIA)
作者: Som, Sukalyan Sen, Sayani Mahapatra, Suman Palit, Sarbani Barrackpore Rastraguru Surendranath Coll Dept Comp Sci Kolkata India Univ Kalyani Dept Comp Sci & Engn Kalyani 741235 W Bengal India Indian Stat Inst CVPR Unit Kolkata India
Ciphered data need an additional level of protection in order to safeguard them from being tampered after the decryption phase. Ciphered data, upon being deciphered by the intended receiver, is unprotected and it can ... 详细信息
来源: 评论
Comparative study of Image Encryption using 2d Chaotic map
Comparative study of Image Encryption using 2D Chaotic Map
收藏 引用
International Conference on Information Systems and Computer Networks (ISCON)
作者: Kabi, Kunal Kumar Pradhan, Chittaranjan Saha, Bidyut Jyoti Bisoi, Ajay Kumar KIIT Univ Sch Comp Engn Bhubaneswar Orissa India
Securing digital image during transmission is very much important in the current era. For this purpose, cryptographic techniques as well as chaotic maps can be applicable. In this paper, we have given a detailed study... 详细信息
来源: 评论