咨询与建议

限定检索结果

文献类型

  • 30 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31 篇 工学
    • 23 篇 计算机科学与技术...
    • 13 篇 电气工程
    • 7 篇 网络空间安全
    • 4 篇 机械工程
    • 4 篇 光学工程
    • 4 篇 软件工程
    • 3 篇 信息与通信工程
    • 2 篇 力学(可授工学、理...
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
  • 8 篇 理学
    • 5 篇 物理学
    • 3 篇 数学
  • 5 篇 医学
    • 5 篇 临床医学
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 34 篇 image encryption...
  • 5 篇 chaos
  • 5 篇 cryptography
  • 4 篇 image processing
  • 2 篇 compressive sens...
  • 2 篇 chosen plaintext...
  • 2 篇 dsp implementati...
  • 2 篇 chaotic mapping
  • 2 篇 cryptanalysis
  • 2 篇 bifurcation
  • 2 篇 security
  • 2 篇 entropy
  • 2 篇 keystream
  • 2 篇 dna coding
  • 2 篇 hyper-chaotic sy...
  • 1 篇 improved chaotic...
  • 1 篇 chebyshev polyno...
  • 1 篇 adaptive diffusi...
  • 1 篇 chaotic economic...
  • 1 篇 discrete fractio...

机构

  • 3 篇 dalian polytech ...
  • 2 篇 faculty of mathe...
  • 2 篇 nanchang univ sc...
  • 1 篇 hebei prov radio...
  • 1 篇 xi'an university...
  • 1 篇 delhi technol un...
  • 1 篇 vellore inst tec...
  • 1 篇 jiangsu univ tec...
  • 1 篇 fujian mm elect ...
  • 1 篇 department of co...
  • 1 篇 school of inform...
  • 1 篇 univ jinan sch m...
  • 1 篇 changchun univ t...
  • 1 篇 wuhan inst techn...
  • 1 篇 college of infor...
  • 1 篇 iran univ sci & ...
  • 1 篇 hexi univ sch ph...
  • 1 篇 changchun inst t...
  • 1 篇 hubei univ econ ...
  • 1 篇 qassim univ comp...

作者

  • 3 篇 mou jun
  • 3 篇 yang feifei
  • 2 篇 norouzi benyamin
  • 2 篇 mirzakuchaki sat...
  • 2 篇 ma chenguang
  • 1 篇 wang xiaoyuan
  • 1 篇 li shiren
  • 1 篇 junyao chen
  • 1 篇 wu shaofei
  • 1 篇 wang hui
  • 1 篇 xu yaoqun
  • 1 篇 ran chu
  • 1 篇 kumar dhirendra
  • 1 篇 咸永锦
  • 1 篇 zheng jiming
  • 1 篇 ye yutong
  • 1 篇 kateb faris
  • 1 篇 gong lihua
  • 1 篇 lei li
  • 1 篇 feifei yang

语言

  • 29 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"主题词=image encryption algorithm"
34 条 记 录,以下是11-20 订阅
排序:
Color image encryption algorithm Using DNA Encoding and Fuzzy Single Neurons
收藏 引用
IEEE ACCESS 2022年 10卷 127770-127782页
作者: Xu, Yaoqun Tang, Meng Harbin Univ Commerce Sch Syst Engn Harbin Peoples R China Harbin Univ Commerce Sch Comp & Informat Engn Harbin Peoples R China
In order to hide image information more efficaciously, improve the radio of workpiece and quality of encryption, this paper proposes delayed chaotic neuron dynamical system, extracts a single neuron research model to ... 详细信息
来源: 评论
Breaking an image encryption algorithm based on the new substitution stage with chaotic functions
收藏 引用
OPTIK 2016年 第14期127卷 5695-5701页
作者: Norouzi, Benyamin Mirzakuchaki, Sattar Iran Univ Sci & Technol Sch Elect Engn Elect Res Ctr POB 16846-13114 Tehran Iran
This paper is a cryptanalysis of a recent proposed image encryption algorithm based on chaotic functions. The cryptosystem is composed of two-stage permutation and one-stage substitution for encryption of the gray sca... 详细信息
来源: 评论
Big data security and privacy protection model based on image encryption algorithm
收藏 引用
SOFT COMPUTING 2023年 1-13页
作者: Hua, Binjie Wang, Zhe Meng, Junying Xi, HaiYan Qi, RuiLi Shijiazhuang Univ Sch Future Informat Technol Shijiazhuang 050035 Hebei Peoples R China Hebei Prov Radio & Televis Microwave Stn Shijiazhuang 050031 Hebei Peoples R China Hebei Inst Radio & Televis Sci & Technol Shijiazhuang 050011 Hebei Peoples R China
The popularity of machine learning, AI and the network has greatly facilitated life, but there are also many security risks, and users' privacy data have been greatly threatened. At present, this kind of problem i... 详细信息
来源: 评论
Parallelizing image encryption algorithm for Wireless Sensor Networks  6
Parallelizing Image Encryption Algorithm for Wireless Sensor...
收藏 引用
6th International Conference for Convergence in Technology (I2CT)
作者: Mohan, Prajval Vemparala, Rohit Anto, S. Vellore Inst Technol Sch Comp Sci & Engn Vellore Tamil Nadu India
In this paper, techniques to improve the overall efficiency of an image encoding algorithm that is specifically designed to be used in Wireless Sensor Networks (WSN) are proposed. The inherent nature of WSN, which con... 详细信息
来源: 评论
image encryption algorithm Based on Latin Squares and Adaptive Z-Diffusion  22
Image Encryption Algorithm Based on Latin Squares and Adapti...
收藏 引用
Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition
作者: Yangguang Lou Shucui Xie Jianzhong Zhang Xi'an University of Posts and Telecommunications China Shaanxi Normal University China
This paper proposes a chaotic encryption algorithm based on Latin squares and adaptive Z-diffusion. First, in order to improve the defects of the traditional Sine system, two-dimensional enhance Sine chaotic system (2... 详细信息
来源: 评论
Indoor thermal energy environment control and beauty health management based on image encryption algorithm
收藏 引用
THERMAL SCIENCE AND ENGINEERING PROGRESS 2024年 56卷
作者: Lei, Li ShanXi Med Univ Hosp 1 Plast Reconstruct & Cosmet Surg Taiyuan 030001 Shanxi Peoples R China
In today's society, effective control of indoor thermal environment and beauty and health management are increasingly valued. This study aims to explore effective methods for indoor thermal environment control and... 详细信息
来源: 评论
A novel image shift encryption algorithm based on the dynamic Joseph ring problem
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2023年 第26期82卷 39897-39927页
作者: Wang, Hui Dong, Boxin Ke, Hongchang Qi, Qianqian Liu, Gang ChangChun Univ Technol Changchun 130012 Peoples R China Changchun Inst Technol Changchun 130012 Peoples R China
image encryption can effectively prevent unauthorized users from stealing personal information. Attackers usually analyze the information of the encrypted image according to the strong correlation between image pixels... 详细信息
来源: 评论
Chosen Plaintext Attacking on a Hyper-chaos image encryption algorithm
Chosen Plaintext Attacking on a Hyper-chaos Image Encryption...
收藏 引用
2013 IEEE 4th International Conference on Electronics Information and Emergency Communication
作者: Yin Yan-Qing Long Zhuo-Min Department of Electronics and Information Engineering Hunan Institute of Technology
The problems of vulnerability of the image encryption algorithm are proposed by the researchers analyzing the algorithm concerning pixel permutation and diffusion based on the hyper-chaos. Not given any knowledge of t... 详细信息
来源: 评论
image encryption scheme based on compressed sensing and fractional quantum logistic-tent map
收藏 引用
CYBERSECURITY 2025年 第1期8卷 1-17页
作者: Xu, Birong Ye, Ximei Wang, Xiaoyuan Zhang, Zhipeng Wuyi Univ Coll Mech & Elect Engn 358Baihua Rd Wuyishan 354300 Fujian Peoples R China Hangzhou Dianzi Univ Sch Elect & Informat Hangzhou 310018 Peoples R China
In this paper, we construct a quantum logistic-tent map and extend it to the fractional order. Using bifurcation portrait, Lyapunov exponent spectrum, and spectral entropy, its nonlinear characteristics are investigat... 详细信息
来源: 评论
An image layered scrambling encryption algorithm based on a novel discrete chaotic map
收藏 引用
IET image PROCESSING 2023年 第2期17卷 518-532页
作者: Tang, Jianeng Zhang, Zezong Chen, Peiyang Zhang, Feng Ni, Hui Huang, Zhongming Huaqiao Univ Coll Engn Quanzhou Peoples R China Huaqiao Univ Coll Informat Sci & Engn Xiamen Peoples R China Fujian MM Elect Co Ltd Quanzhou Peoples R China
At present, the image encryption algorithm based on the bit-plane has the problem that the encryption speed and the encryption effect cannot be well balanced. To address the problem, an image layered scrambling encryp... 详细信息
来源: 评论