Computer Science ››2019,Vol. 46 ››Issue (11A): 477-482.
• Information Security • Previous Articles Next Articles
HAN Xue-juan1, LI Guo-dong1, WANG Si-xiu2
CLC Number:
HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos[J].Computer Science, 2019, 46(11A): 477-482.
Add to citation managerEndNote|Reference Manager|ProCite|BibTeX|RefWorks
[1]徐潇,马峻,赵飞乐,等.Arnold变换和混沌映射的计算全息多图像同步加密[J].激光杂志,2018,39(6):57-60. [2]LIU C,LIU Y,ZHANG L Y,et al. Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem[J].Signal Process-image,2014,29:914-920. [3]徐兵,袁立. 基于改进Logistic混沌映射的数字图像加密算法研究[J]. 计算机测量与控制,2014(7):165-167. [4]RAMADAN N,AHMED H,ELDIN H,et al.Permutation-substitution image encryption scheme based on a modified chaotic map in transform domain[J].Journal of Central South University,2017,24(9):2049-2057. [5]张颖,杨玥.Arnold双置乱图像加密算法[J].辽宁工程技术大学学报(自然科学版),2013,32(10):1429-1432. [6]朱淑芹,王文宏,孙忠贵.对一种基于比特置乱的超混沌图像加密算法的选择明文攻击[J].计算机科学,2017,44(11):273-278. [7]林青,王延江,王珺.基于超混沌系统的图像加密算法[J].中国科学:技术科学,2016,46(9):910-918. [8]杨志宏,屈双惠,张彩霞,等.一个四翼超混沌系统在图像加密技术中的应用[J].西南大学学报(自然科学版),2018,40(5):170-177. [9]VASILEIOS B,CHRIS G. Antonopoulos. Hyperchaos & labyrinth chaos: revisiting Thomas-Rssler systems[J]. Journal of Theoretical Biology,2018. [10]张勋才,刘奕杉,崔光照.基于DNA编码和超混沌系统的图像加密算法[J].计算机应用研究,2019(4):1-6. [11]ZHANG S,YANG L,ZHANG Y,et al.A Bit Level Encryption Scheme Based on Hyper-chaotic System Combing with the Ideology of Central Dogma[J].Chinese Journal of Electronics,2018,27(3):595-602. [12]LI G D,WANG L L. Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform [J]. Visual Computer,2018,1(1):1-11. [13]胡克亚,王君,王莹.基于分块压缩感知和改进幻方变换的图像加密[J].激光技术,2018:1-11. [14]王静,蒋国平.一种超混沌图像加密算法的安全性分析及其改进[J].物理学报,2011,60(6):83-93. |
[1] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong.Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map[J]. Computer Science, 2022, 49(8): 344-349. |
[2] | ZHANG Sai-nan, LI Qian-mu.Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping[J]. Computer Science, 2022, 49(1): 353-358. |
[3] | SHI Ke-xiang, BAO Li-yong, DING Hong-wei, GUAN Zheng, ZHAO Lei.Chaos Artificial Bee Colony Algorithm Based on Homogenizing Optimization of Generated Time Series[J]. Computer Science, 2021, 48(7): 270-280. |
[4] | LIU Han-qing, KANG Xiao-dong, GAO Wan-chun, LI Bo, WANG Ya-ge, ZHANG Hua-li, BAI Fang.Research on Propagation of COVID-19 Based on Multiple Models[J]. Computer Science, 2021, 48(6A): 196-202. |
[5] | BAN Duo-han, LV Xin, WANG Xin-yuan.Efficient Image Encryption Algorithm Based on 1D Chaotic Map[J]. Computer Science, 2020, 47(4): 278-284. |
[6] | YU Feng,GONG Xin-hui,WANG Shi-hong.Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion[J]. Computer Science, 2020, 47(2): 276-280. |
[7] | TIAN Jun-feng, PENG Jing-jing, ZUO Xian-yu, GE Qiang, FAN Ming-hu.Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps[J]. Computer Science, 2020, 47(10): 327-331. |
[8] | ZHANG He-jie,MA Wei-hua.Subway Passenger Flow Forecasting Model Based on Temporal and Spatial Characteristics[J]. Computer Science, 2019, 46(7): 292-299. |
[9] | LV Dong-mei, LI Guo-dong.Spatial Encryption Algorithm Based on Double Chaos and Color Image[J]. Computer Science, 2019, 46(11A): 450-454. |
[10] | WANG Li-juan, LI Guo-dong, LV Dong-mei.Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control[J]. Computer Science, 2019, 46(11A): 469-472. |
[11] | ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei.Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm[J]. Computer Science, 2019, 46(11A): 483-487. |
[12] | LIANG Yan-hui, LI Guo-dong, WANG Ai-yan.Frequency Domain Adaptive Image Encryption Algorithm Based on Fractional Order Chen Hyperchaos[J]. Computer Science, 2019, 46(11A): 488-492. |
[13] | LIANG Yan-hui, LI Guo-dong.Image Encryption Algorithm of Chaotic Cellular Automata Based on Fractional Hyperchaos[J]. Computer Science, 2019, 46(11A): 502-506. |
[14] | CHEN Gui-ping,WANG Zi-niu.Multiple Encrypted Storage Technology of User Information Based on Big Data Analysis[J]. Computer Science, 2018, 45(7): 150-153. |
[15] | ZHU Shu-qin, WANG Wen-hong and LI Jun-qing.Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model[J]. Computer Science, 2018, 45(4): 178-181. |
|