期刊文献+

图像安全的椭圆曲线加密实现 被引量:6

The elliptic curve encryption accomplish of image security
在线阅读 下载PDF
导出
摘要 进一步讨论了图像数据处理的一般方法及其与加密的关系 ;给出了图像数据加密的椭圆曲线选定和图像数据明文嵌入E(Fq)的算法 。 This paper further discusses the relation of the common way of image data processing and encryption; gives the selection of elliptic curve of image data encryption, the algorithm of image data plaintext embedded into E(F q) , and discusses the algorithm.
出处 《山东大学学报(工学版)》 CAS 2004年第3期33-36,共4页 Journal of Shandong University(Engineering Science)
关键词 图像加密 椭圆曲线 明文嵌入 算法 image encryption elliptic curve plaintext embedded into algorithm
  • 相关文献

参考文献10

  • 1史开泉,崔玉泉.双枝模糊决策与决策加密-认证[J].中国科学(E辑),2003,33(2):154-163. 被引量:41
  • 2卢昌荆,史开泉.图像的一维迭代加密-识别[J].山东大学学报(工学版),2003,33(5):546-549. 被引量:4
  • 3SHI Kaiquan, CUI Yuquan. Both-branch fuzzy decision and decision encryption-authentication [ J ]. SCIENCE IN CHINA(series F): Information Scinences, 2003,46(2):90-103.
  • 4KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 2000,198(17):203-209.
  • 5PERALTA R J. A simple and fast probabilistic algorithm for square roots a prime number[ J ]. IEEE Transactions on Information Theory, 1986,32(6) :846-847.
  • 6SILVERMAN R D, WAG STAFF S S . A practical and analysis of the elliptic curve factoring algorithm [ J]. Mathematics of Computation, 1993, (61) :445-462.
  • 7KOBLITZ N. Elliptic curve implementation of Zero-Knowl-edge Bloks[J]. Journal of Cryptology, 1991, 4(3) :207-213.
  • 8卢昌荆,史开泉.图像的二维混合迭代加密识别[J].山东大学学报(工学版),2003,33(6):681-684. 被引量:2
  • 9赵荣椿.数字图像处理导论[M].西安:西安工业大学出版社,1994.66-71.
  • 10高文.多媒体数据压缩技术[M].北京:电子工业出版社,1998.82-93.

二级参考文献21

  • 1史开泉,崔玉泉.Both-branch fuzzy decision and decision encryptionauthentication[J].Science in China(Series F),2003,46(2):90-103. 被引量:28
  • 2卢开澄.计算机密码学[M].北京:清华大学出版社,2000..
  • 3SHI Kaiquan,CUI Yuquan.Both—branch fuzzy decision and decision encryption—authentication[J].SCIENCE IN CHINA:Information Science(series F),2003,46(2):90-103.
  • 4HAN Guoping,SHI Kaiquan.Half-encryption and full-encryption of fuzzy recognition[J].International Journal of Fuzzy Mathematics,2002,10(2):385—397.
  • 5HAN Guoping,SHI Kaiquan.Fuzzy decision and group encryption-group sharing of decision conclusion[J].International Journal of Fuzzy Mathematics.2003,11(3):5—10.
  • 6HAN Guoping,SHI Kaiquan.Eneryption of fuzzy recognition with t-order iteration[J].International Journal of Fizzy Mathematics,2003,11(3):4-12.
  • 7KOBLIZ N.Elliptic curve cryptoSystem[J].International Journal of Mathematics of Computer,1987,48(17):203—209.
  • 8RIVEST R.SHZMIR A,ADLEMAN L.A method for obtaining digital signature and public—key cryptosystems[J].International Journal of Communications of the Associations for Computing Machinery,1978,20(2):120—126.
  • 9HAN Guoping, SHI Kaiquan. Half-encryption and full-encryption of fuzzy recognition[J]. International Journal of fuzzy Mathematics, 2002,10(2):385-397.
  • 10HAN Guoping, SHI Kaiquan. Fuzzy decision and group encryption-group sharing of decision conclusion[J]. International Journal of Fuzzy Mathematics,2003,10(4):56-58.

共引文献40

同被引文献50

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部