2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) 2015
DOI: 10.1109/iccicct.2015.7475347
|View full text |Cite
|
Sign up to set email alerts
|

The implementation of chaotic encryption scheme for images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0
1

Year Published

2017
2017
2017
2017

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 18 publications
0
0
0
1
Order By: Relevance
“…常见的置乱变换技术有 Arnold 变换 [7] 、幻方 [8] 、骑士巡游变 换 [9] 、Hilbert 曲线 [10] 等. 由于混沌 [11,12] 系统具有遍历性、混沌性、指数发散性, 并且对系统初值和 参数具有很高的敏感性, 因此混沌序列也常常被用于图像置乱加密中. Logistic 映射是一个典型的混 沌系统, 常被应用于密码系统中.…”
Section: 图像加密技术unclassified
“…常见的置乱变换技术有 Arnold 变换 [7] 、幻方 [8] 、骑士巡游变 换 [9] 、Hilbert 曲线 [10] 等. 由于混沌 [11,12] 系统具有遍历性、混沌性、指数发散性, 并且对系统初值和 参数具有很高的敏感性, 因此混沌序列也常常被用于图像置乱加密中. Logistic 映射是一个典型的混 沌系统, 常被应用于密码系统中.…”
Section: 图像加密技术unclassified