参考文献
[1]Gao Tiegang,Chen Zengqiang.Image Encryption Base on a New Total Shuffling Algorithmm[J].Chaos Solitons & Fractals, 2008, 38(1):213-220.
[2]Zhang Guoji,Liu Qing.A Novel Image Encryption Method Based on Total Shuffling Scheme[J].Optics Communications, 2011, 284(12): 2775-2780.
[3]王静,蒋国平.一种超混沌图像加密算法的安全性分析及其改进[J].物理学报,2011,60(6):83-93.
[4]Wang Xingyuan,He Guoxiang.Cryptanalysis on a Novel Image Encryption Method Based on Total Shuffling Scheme[J].Optics Communications,2011,284(24):5804-5807.
[5]Zhu Congxu,Liao Chunlong, Deng Xiaoheng.Breaking and Improving an Image Encryption Scheme Based on Total Shuffling Scheme[J].Nonlinear Dynamics,2013,71(1/2):25-34.
[6]Teng Lin,Wang Xingyuan.A Bit-level Image Encryption Algorithm Based on Spatiot-emporal Chaotic System and Self Adaptive[J].Optics Communications,2012,285(20):4048-4054.
[7]Zhu Congxu.A Novel Image Encryption Scheme Based on Improved Hyperchaotic Sequences[J].Optics Communications,2012,285(1):29-37.
[8]Liu Zhengjun,Xu Lie,Liu Ting, et al.Color Image Encryption by Using Arnold Transform and Colorblend Operation in Discrete Cosine Transform Domains[J].Optics Communications,2011,284(1):123-128.
[9]文昌辞,王沁,黄付敏,等.JPEG彩色图像自适应加密算法[J].计算机辅助设计与图形学学报,2012,24(4):500-505.
[10]Musheer A,Omar F.Secure Satellite Images Transmission Scheme Based on Chaos and Discrete Wavelet Transform[C]//Proceedings of Conference on High Performance Architecture and Grid Computing.Berlin, Germany: Springer,2011:257-264.
(下转第192页)
(上接第186页)
[11]Zhang Xiaoqiang,Zhu Guiliang,Ma Shilong.Remote Sensing Image Encryption in Hybrid Domains[J].Optics Communications, 2012, 285(7):1736-1743.
[12]Bhatnagar G,Wu Q M J.Chaos-based Security Solution for Fingerprint Data During Communication and Transmission[J].IEEE Transactions on Instrumentation and Measurement, 2012,61(4):876-887.
[13]Bhatnagar G,Wu Q M J,Raman B.Image and Video Encryption Based on Dual Spacefilling Curves[J].Computer Journal, 2012,55(6):667-685.
[14]Tajima A,Tanaka A,Maeda W,et al.Practical Quantum Cryptosystem for Metro Area Applications[J].IEEE Journal of Selected Topics in Quantum Electronics, 2007, 13(4):1031-1038.
[15]Akhshani A,Akhavan A,Lim S C,et al.An Image Encryption Scheme Based on Quantum Logistic Map[J].Communications in Nonlinear Science and Numerical Simulation,2012,17(12):4653-4661.
[16]Wu Yue,Yang Gelan, Jin Huixia, et al.Image Encryption Using the Two-dimensional Logistic Chaotic Map[J].Electron Imaging, 2012, 21(1):13-25.
[17]Berry M V,Balazs N L,Tabor M,et al.Quantum maps[J].Annals of Physics,1979, 122(1):26-63.
[18]Goggin M E,Sundaram B, Milonni P W.Quantum Logistic Map[J].Physical Review A, 1990,41(10):5705-5708.
[19]邓晓衡,廖春龙,朱从旭,等.像素位置与比特双重置乱的图像混沌加密算法[J].通信学报,2014,35(3):216-223.
编辑顾逸斐 |