Image encryption algorithm with an avalanche effect based on a six-dimensional discrete chaotic system
暂无分享,去创建一个
[1] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[2] Jin Li,et al. Securely Outsourcing Attribute-Based Encryption with Checkability , 2014, IEEE Transactions on Parallel and Distributed Systems.
[3] Lin Teng,et al. A novel colour image encryption algorithm based on chaos , 2012, Signal Process..
[4] Rafik Hamza,et al. A novel pseudo random sequence generator for image-cryptographic applications , 2017, J. Inf. Secur. Appl..
[5] Julien Clinton Sprott,et al. Hyperchaos and hyperchaos control of the sinusoidally forced simplified Lorenz system , 2012 .
[6] Jin Li,et al. New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations , 2015, IEEE Transactions on Information Forensics and Security.
[7] S. Mitra,et al. Multi-objective optimization of hole characteristics during pulsed Nd:YAG laser microdrilling of gamma-titanium aluminide alloy sheet , 2014 .
[8] Xingyuan Wang,et al. Color image encryption using spatial bit-level permutation and high-dimension chaotic system , 2011 .
[9] Zhongmeng Zhao,et al. Chaotic image encryption based on circular substitution box and key stream buffer , 2014, Signal Process. Image Commun..
[10] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[11] Dragan Lambić,et al. Cryptanalyzing a novel pseudorandom number generator based on pseudorandomly enhanced logistic map , 2017 .
[12] Navin Rajpal,et al. A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps , 2015, Multimedia Tools and Applications.
[13] Lequan Min,et al. Discrete Chaotic Systems with One-Line Equilibria and Their Application to Image Encryption , 2017, Int. J. Bifurc. Chaos.
[14] L. Cardoza-Avendaño,et al. A novel pseudorandom number generator based on pseudorandomly enhanced logistic map , 2016, Nonlinear Dynamics.
[15] Richard J. Spillman,et al. Classical and Contemporary Cryptology , 2004 .
[16] Yuansheng Liu,et al. Cryptanalyzing a RGB image encryption algorithm based on DNA encoding and chaos map , 2013, 1307.4279.
[17] Qiang Lai,et al. Research on a new 3D autonomous chaotic system with coexisting attractors , 2016 .
[18] Mahmoud Al-Ayyoub,et al. Impact of digital fingerprint image quality on the fingerprint recognition accuracy , 2017, Multimedia Tools and Applications.
[19] G. Lakpathi,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .
[20] Bin Zhu,et al. A Novel Color Image Encryption Scheme Using Rectangular Transform-Enhanced Chaotic Tent Maps , 2017, IEEE Access.
[21] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[22] Xuan Li,et al. Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram , 2017, Multimedia Tools and Applications.
[23] H. Feistel. Cryptography and Computer Privacy , 1973 .
[24] Julien Clinton Sprott,et al. Coexistence of Point, periodic and Strange attractors , 2013, Int. J. Bifurc. Chaos.
[25] J. Sprott. Chaos and time-series analysis , 2001 .
[26] Yicong Zhou,et al. $n$ -Dimensional Discrete Cat Map Generation Using Laplace Expansions , 2016, IEEE Transactions on Cybernetics.
[27] Kehui Sun,et al. Cryptanalyzing and Improving a Novel Color Image Encryption Algorithm Using RT-Enhanced Chaotic Tent Maps , 2018, IEEE Access.
[28] Jie Wu,et al. Achieving reliable and secure services in cloud computing environments , 2017, Comput. Electr. Eng..
[29] Zhongmeng Zhao,et al. An efficient chaotic image encryption based on alternate circular S-boxes , 2014, Nonlinear Dynamics.
[30] Amin Zarei,et al. Complex dynamics in a 5-D hyper-chaotic attractor with four-wing, one equilibrium and multiple chaotic attractors , 2015 .
[31] Lequan Min,et al. A cubic map chaos criterion theorem with applications in generalized synchronization based pseudorandom number generator and image encryption. , 2015, Chaos.
[32] Hongjun Liu,et al. Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..
[33] Xiaoling Huang,et al. An image encryption algorithm based on hyper-chaos and DNA sequence , 2012, Multimedia Tools and Applications.
[34] Siu-Ming Yiu,et al. Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..
[35] Guanrong Chen,et al. A four-wing chaotic attractor generated from a new 3-D quadratic autonomous system , 2008 .
[36] Qiang Zhang,et al. A RGB image encryption algorithm based on DNA encoding and chaos map , 2009, Comput. Electr. Eng..
[37] Yongjian Liu,et al. A new hyperchaotic system from the Lü system and its control , 2011, J. Comput. Appl. Math..
[38] Wanlei Zhou,et al. Modeling malicious activities in cyber space , 2015, IEEE Network.
[39] Lequan Min,et al. A novel stream encryption scheme with avalanche effect , 2013 .
[40] Congxu Zhu,et al. A novel image encryption scheme based on improved hyperchaotic sequences , 2012 .
[41] Jin Li,et al. Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..