咨询与建议

限定检索结果

文献类型

  • 30 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31 篇 工学
    • 23 篇 计算机科学与技术...
    • 13 篇 电气工程
    • 7 篇 网络空间安全
    • 4 篇 机械工程
    • 4 篇 光学工程
    • 4 篇 软件工程
    • 3 篇 信息与通信工程
    • 2 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
  • 8 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
  • 5 篇 医学
    • 5 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 34 篇 image encryption...
  • 5 篇 chaos
  • 5 篇 cryptography
  • 4 篇 image processing
  • 2 篇 compressive sens...
  • 2 篇 chosen plaintext...
  • 2 篇 dsp implementati...
  • 2 篇 chaotic mapping
  • 2 篇 cryptanalysis
  • 2 篇 bifurcation
  • 2 篇 security
  • 2 篇 entropy
  • 2 篇 keystream
  • 2 篇 dna coding
  • 2 篇 hyper-chaotic sy...
  • 1 篇 improved chaotic...
  • 1 篇 chebyshev polyno...
  • 1 篇 adaptive diffusi...
  • 1 篇 chaotic economic...
  • 1 篇 discrete fractio...

机构

  • 3 篇 dalian polytech ...
  • 2 篇 faculty of mathe...
  • 2 篇 nanchang univ sc...
  • 1 篇 hebei prov radio...
  • 1 篇 xi'an university...
  • 1 篇 delhi technol un...
  • 1 篇 vellore inst tec...
  • 1 篇 jiangsu univ tec...
  • 1 篇 fujian mm elect ...
  • 1 篇 department of co...
  • 1 篇 school of inform...
  • 1 篇 univ jinan sch m...
  • 1 篇 changchun univ t...
  • 1 篇 wuhan inst techn...
  • 1 篇 college of infor...
  • 1 篇 iran univ sci & ...
  • 1 篇 hexi univ sch ph...
  • 1 篇 changchun inst t...
  • 1 篇 hubei univ econ ...
  • 1 篇 qassim univ comp...

作者

  • 3 篇 mou jun
  • 3 篇 yang feifei
  • 2 篇 norouzi benyamin
  • 2 篇 mirzakuchaki sat...
  • 2 篇 ma chenguang
  • 1 篇 wang xiaoyuan
  • 1 篇 li shiren
  • 1 篇 junyao chen
  • 1 篇 wu shaofei
  • 1 篇 wang hui
  • 1 篇 xu yaoqun
  • 1 篇 ran chu
  • 1 篇 kumar dhirendra
  • 1 篇 咸永锦
  • 1 篇 zheng jiming
  • 1 篇 ye yutong
  • 1 篇 kateb faris
  • 1 篇 gong lihua
  • 1 篇 lei li
  • 1 篇 feifei yang

语言

  • 29 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=Image Encryption Algorithm"
34 条 记 录,以下是21-30 订阅
排序:
2D arcsine and sine combined logistic map for image encryption
收藏 引用
VISUAL COMPUTER 2023年 第4期39卷 1517-1532页
作者: Ding, Yi Duan, Zhikui Li, Shiren Hunan Univ Arts & Sci Changde Peoples R China Foshan Univ Foshan Peoples R China Sun Yat Sen Univ Guangzhou Peoples R China
Chaotic system is widely applied in field of information security because of its excellent properties of unpredictability, no periodicity, pseudo-randomness, and high sensitivity to initial parameters. In this paper, ... 详细信息
来源: 评论
Construction of 24-by-24 nonlinear layer for symmetric algorithm and its application to data encryption in parallel with DNA transform
收藏 引用
JOURNAL OF SUPERCOMPUTING 2024年 第1期80卷 1037-1058页
作者: Shah, Tariq ul Haq, Tanveer Quaid i Azam Univ Dept Math Islamabad Pakistan
The principal constituent of a block cipher in symmetric-key cryptography is the Boolean function, determining the substitution box (S-box). Block ciphers rely totally on S-boxes with excellent nonlinearity and uprigh... 详细信息
来源: 评论
A color image encryption and decryption scheme based on extended DNA coding and fractional-order 5D hyper-chaotic system
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2024年 254卷
作者: Meng, Fan-Qi Wu, Gang Yancheng Teachers Univ Sch Math & Stat Yancheng 224002 Peoples R China
With the advancement of information technology, the security of digital images has become increasingly important. To ensure the integrity of images, this paper presents a novel color image encryption and decryption ar... 详细信息
来源: 评论
The coupled Kaplan-Yorke-Logistic map for the image encryption applications
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2024年 120卷
作者: Pal, Puneet Kumar Kumar, Dhirendra Delhi Technol Univ Dept Appl Math Delhi 110042 India
Chaos has practical significance in various domains, including the stock market, quantum physics, communication networks, disease diagnosis, cosmic events, and digital data security. Chaotic maps are widely utilised f... 详细信息
来源: 评论
DNA image encryption Scheme Based on a Chaotic LSTM Pseudo-Random Number Generator
收藏 引用
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS 2023年 第6期33卷 2350067-2350067页
作者: Koubaa, Karama Derbel, Nabil Univ Sfax Natl Engn Sch Sfax Control & Energy Management Lab CEMLab BP 1173 Sfax 3038 Tunisia
Deoxyribonucleic Acid (DNA) coding technology is a new research field developed by the combination of computer science and molecular biology, that has been gradually applied in the field of image encryption in recent ... 详细信息
来源: 评论
Dynamic analysis of an improper fractional-order laser chaotic system and its image encryption application
收藏 引用
OPTICS AND LASERS IN ENGINEERING 2020年 129卷 106031-106031页
作者: Yang, Feifei Mou, Jun Ma, Chenguang Cao, Yinghong Dalian Polytech Univ Sch Informat Sci & Engn Dalian 116034 Liaoning Peoples R China
The fractional-order chaotic systems have characteristics of the all chaotic systems, however, the improper fractional-order chaotic systems have more complexity random sequences, which more suitable for chaotic crypt... 详细信息
来源: 评论
image encryption Application of Chaotic Sequences Incorporating Quantum Keys
收藏 引用
International Journal of Automation and computing 2020年 第1期17卷 123-138页
作者: Bin Ge Hai-Bo Luo School of Computer Science and Engineering Anhui University of Science and Technology
This paper proposes an image encryption algorithm LQBPNN(logistic quantum and back propagation neural network)based on chaotic sequences incorporating quantum keys. Firstly, the improved one-dimensional logistic cha... 详细信息
来源: 评论
image encryption based on Fisher-Yates shuffling and three dimensional chaotic economic map
收藏 引用
IET image PROCESSING 2019年 第12期13卷 2086-2097页
作者: Karawia, Abdelrahman Qassim Univ Comp Sci Unit Deanship Educ Serv Buraydah 51452 Saudi Arabia Mansoura Univ Dept Math Fac Sci Mansoura 35516 Egypt
Recently, few researchers investigated algorithms of image encryption using different chaotic economic maps (CEMs). However, the authors investigated the effect of these maps on the encryption of the plain image. In t... 详细信息
来源: 评论
Chosen Plaintext Attacking on a Hyper-chaos image encryption algorithm
Chosen Plaintext Attacking on a Hyper-chaos Image Encryption...
收藏 引用
2013 IEEE 4th International Conference on Electronics Information and Emergency Communication
作者: Yin Yan-Qing Long Zhuo-Min Department of Electronics and Information Engineering Hunan Institute of Technology
The problems of vulnerability of the image encryption algorithm are proposed by the researchers analyzing the algorithm concerning pixel permutation and diffusion based on the hyper-chaos. Not given any knowledge of t... 详细信息
来源: 评论
Characteristic analysis of the fractional-order hyperchaotic complex system and its image encryption application
收藏 引用
SIGNAL PROCESSING 2020年 第0期169卷 107373-000页
作者: Yang, Feifei Mou, Jun Liu, Jian Ma, Chenguang Yan, Huizhen Dalian Polytech Univ Sch Informat Sci & Engn Dalian 116034 Peoples R China Univ Jinan Sch Math Sci Jinan 250022 Peoples R China
To explore characteristic of a new system with fractional order and complex variables, based on Adomian decomposition method (ADM), its nonlinear dynamical behaviors are discussed by bifurcation diagram, Lyapunov expo... 详细信息
来源: 评论