期刊文献+
共找到2,178篇文章
< 1 2 109 >
每页显示 20 50 100
Quantum color image encryption: Dual scrambling scheme based on DNA codec and quantum Arnold transform
1
作者 Tao Cheng Run-Sheng Zhao +2 位作者 Shuang Wang Kehan Wang Hong-Yang Ma 《Chinese Physics B》 2025年第1期235-244,共10页
In the field of Internet, an image is of great significance to information transmission. Meanwhile, how to ensure and improve its security has become the focus of international research. We combine DNA codec with quan... In the field of Internet, an image is of great significance to information transmission. Meanwhile, how to ensure and improve its security has become the focus of international research. We combine DNA codec with quantum Arnold transform(QAr T) to propose a new double encryption algorithm for quantum color images to improve the security and robustness of image encryption. First, we utilize the biological characteristics of DNA codecs to perform encoding and decoding operations on pixel color information in quantum color images, and achieve pixel-level diffusion. Second, we use QAr T to scramble the position information of quantum images and use the operated image as the key matrix for quantum XOR operations. All quantum operations in this paper are reversible, so the decryption operation of the ciphertext image can be realized by the reverse operation of the encryption process. We conduct simulation experiments on encryption and decryption using three color images of “Monkey”, “Flower”, and “House”. The experimental results show that the peak value and correlation of the encrypted images on the histogram have good similarity, and the average normalized pixel change rate(NPCR) of RGB three-channel is 99.61%, the average uniform average change intensity(UACI) is 33.41%,and the average information entropy is about 7.9992. In addition, the robustness of the proposed algorithm is verified by the simulation of noise interference in the actual scenario. 展开更多
关键词 DNA codec quantum Arnold transform quantum image encryption algorithm
原文传递
An Image Encryption Algorithm Based on BP Neural Network and Hyperchaotic System 被引量:10
2
作者 Feifei Yang Jun Mou +1 位作者 Yinghong Cao Ran Chu 《China Communications》 SCIE CSCD 2020年第5期21-28,共8页
To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryption algorithm based... To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryption algorithm based on fractional-order memristive hyperchaotic system and BP neural network is proposed. In this algorithm, the image pixel values are compressed by BP neural network, the chaotic sequences of the fractional-order memristive hyperchaotic system are used to diffuse the pixel values. The experimental simulation results indicate that the proposed algorithm not only can effectively compress and encrypt image, but also have better security features. Therefore, this work provides theoretical guidance and experimental basis for the safe transmission and storage of image information in practical communication. 展开更多
关键词 BP neural network fractional-order hyperchaotic system image encryption algorithm secure communication
在线阅读 下载PDF
A realizable quantum encryption algorithm for qubits 被引量:5
3
作者 周南润 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2005年第11期2164-2169,共6页
A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext spa... A realizable quantum encryption algorithm for qubits is presented by employing bit-wise quantum computation. System extension and bit-swapping are introduced into the encryption process, which makes the ciphertext space expanded greatly. The security of the proposed algorithm is analysed in detail and the schematic physical implementation is also provided. It is shown that the algorithm, which can prevent quantum attack strategy as well as classical attack strategy, is effective to protect qubits. Finally, we extend our algorithm to encrypt classical binary bits and quantum entanglements. 展开更多
关键词 quantum encryption algorithm quantum computation CRYPTOGRAPHY
原文传递
An Analysis of International Data Encryption Algorithm(IDEA) Security against Differential Cryptanalysis 被引量:3
4
作者 CHEN Jia XUE Dongyue LAI Xuejia 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期697-701,共5页
The security of international date encryption algorithm (IDEA(16)), a mini IDEA cipher, against differential cryptanalysis is investigated. The results show that [DEA(16) is secure against differential cryptanal... The security of international date encryption algorithm (IDEA(16)), a mini IDEA cipher, against differential cryptanalysis is investigated. The results show that [DEA(16) is secure against differential cryptanalysis attack after 5 rounds while IDEA(8) needs 7 rounds for the same level of security. The transition matrix for IDEA(16) and its eigenvalue of second largest magnitude are computed. The storage method for the transition matrix has been optimized to speed up file I/O. The emphasis of the work lies in finding out an effective way of computing the eigenvalue of the matrix. To lower time complexity, three mature algorithms in finding eigenvalues are compared from one another and subspace iteration algorithm is employed to compute the eigenvalue of second largest module, with a precision of 0.001. 展开更多
关键词 international date encryption algorithm(IDEA) cipher differential cryptanalysis Markov cipher transition matrix subspace iteration
原文传递
A self-cited pixel summation based image encryption algorithm 被引量:1
5
作者 Guo-Dong Ye Xiao-Ling Huang +1 位作者 Leo Yu Zhang Zheng-Xia Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第1期131-138,共8页
In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make ... In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-imagedependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryption algorithm is immune to the known plaintext attack(KPA) and the chosen plaintext attack(CPA). Moreover, experimental simulations and security analyses show that the proposed permutationdiffusion encryption scheme can achieve a satisfactory level of security. 展开更多
关键词 pixel summation image encryption algorithm intertwining logistic map GRAVITY SECURITY
原文传递
Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing 被引量:1
6
作者 王兴元 王哓丽 +2 位作者 滕琳 蒋东华 咸永锦 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期136-149,共14页
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. F... A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. First, a dynamic spiral block scrambling is designed to encrypt the sparse matrix generated by performing discrete wavelet transform(DWT)on the plain image. Then, the encrypted image is compressed and quantified to obtain the noise-like cipher image. Then the cipher image is embedded into the alpha channel of the carrier image in portable network graphics(PNG) format to generate the visually meaningful steganographic image. In our scheme, the hyperchaotic Lorenz system controlled by the hash value of plain image is utilized to construct the scrambling matrix, the measurement matrix and the embedding matrix to achieve higher security. In addition, compared with other existing encryption algorithms, the proposed PNG-based embedding method can blindly extract the cipher image, thus effectively reducing the transmission cost and storage space. Finally, the experimental results indicate that the proposed encryption algorithm has very high visual security. 展开更多
关键词 chaotic image encryption compressive sensing meaningful cipher image portable network graphics image encryption algorithm
原文传递
An image joint compression-encryption algorithm based on adaptive arithmetic coding
7
作者 邓家先 邓海涛 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第9期403-408,共6页
Through a series of studies on arithmetic coding and arithmetic encryption, a novel image joint compression- encryption algorithm based on adaptive arithmetic coding is proposed. The contexts produced in the process o... Through a series of studies on arithmetic coding and arithmetic encryption, a novel image joint compression- encryption algorithm based on adaptive arithmetic coding is proposed. The contexts produced in the process of image compression are modified by keys in order to achieve image joint compression encryption. Combined with the bit-plane coding technique, the discrete wavelet transform coefficients in different resolutions can be encrypted respectively with different keys, so that the resolution selective encryption is realized to meet different application needs. Zero-tree coding is improved, and adaptive arithmetic coding is introduced. Then, the proposed joint compression-encryption algorithm is simulated. The simulation results show that as long as the parameters are selected appropriately, the compression efficiency of proposed image joint compression-encryption algorithm is basically identical to that of the original image compression algorithm, and the security of the proposed algorithm is better than the joint encryption algorithm based on interval splitting. 展开更多
关键词 image compression joint compression-encryption algorithm arithmetic encryption progressiveclassification encryption
原文传递
Enhancement of Video Encryption Algorithm Performance Using Finite Field Z2^3-Based Chaotic Cipher
8
作者 M. T. Suryadi B. Budiardjo K. Ramli 《通讯和计算机(中英文版)》 2012年第8期960-964,共5页
关键词 混沌密码 有限域 加密算法 性能 视频 已知明文攻击 加密过程 密码学
在线阅读 下载PDF
Algebraic Cryptanalysis of GOST Encryption Algorithm
9
作者 Ludmila Babenko Ekaterina Maro 《Journal of Computer and Communications》 2014年第4期10-17,共8页
This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic an... This paper observes approaches to algebraic analysis of GOST 28147-89 encryption algorithm (also known as simply GOST), which is the basis of most secure information systems in Russia. The general idea of algebraic analysis is based on the representation of initial encryption algorithm as a system of multivariate quadratic equations, which define relations between a secret key and a cipher text. Extended linearization method is evaluated as a method for solving the nonlinear sys- tem of equations. 展开更多
关键词 encryption algorithm GOST GOST S-BOX Systems of MULTIVARIATE QUADRATIC Equations ALGEBRAIC CRYPTANALYSIS Extended LINEARIZATION Method Gaussian Elimination
在线阅读 下载PDF
Logical mistakes in NTRU compensation algorithm and improvement of encryption verification algorithm
10
作者 QUAN Yi-ning LI Xin-she HU Yu-pu 《通讯和计算机(中英文版)》 2008年第6期35-41,共7页
关键词 逻辑错误 计算方法 解码 信息技术
在线阅读 下载PDF
Fortifying Healthcare Data Security in the Cloud:A Comprehensive Examination of the EPM-KEA Encryption Protocol
11
作者 Umi Salma Basha Shashi Kant Gupta +2 位作者 Wedad Alawad SeongKi Kim Salil Bharany 《Computers, Materials & Continua》 SCIE EI 2024年第5期3397-3416,共20页
A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is stil... A new era of data access and management has begun with the use of cloud computing in the healthcare industry.Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity Operations.We use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional method.This suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data. 展开更多
关键词 Cloud computing healthcare data security enhanced parallel multi-key encryption algorithm(EPM-KEA)
在线阅读 下载PDF
An algorithm of file encryption based on sum function sequences
12
作者 ZHOU Lei LU Hai-lian +1 位作者 SUN Yu-qiang GU Yu-wan 《通讯和计算机(中英文版)》 2008年第1期48-52,共5页
关键词 和函数序列 编码算法 信息安全 加密
在线阅读 下载PDF
Image Encryption and Decryption Based on Chaotic Algorithm
13
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos algorithm Image encryption and Decryption Two-Stage Logistic Mapping M Sequence
在线阅读 下载PDF
面向无线传感网络安全的轻量级加密算法研究 被引量:1
14
作者 石鲁生 朱慧博 《传感技术学报》 北大核心 2025年第1期168-173,共6页
轻量级加密算法需在保证安全性的同时尽可能地降低计算和存储资源的消耗,以适应传感器节点的硬件限制。为同时提高数据传输的安全性和准确性,降低传感器节点能耗和计算量,提出面向无线传感网络安全的轻量级加密算法。建立传感器节点分... 轻量级加密算法需在保证安全性的同时尽可能地降低计算和存储资源的消耗,以适应传感器节点的硬件限制。为同时提高数据传输的安全性和准确性,降低传感器节点能耗和计算量,提出面向无线传感网络安全的轻量级加密算法。建立传感器节点分簇模型,为簇首分配相应的对称密钥;利用TCDCP算法构建WSN线性回归模型,采集经过密钥分配处理后的感知数据;引入流密钥的轻量级同态加密算法,实现对感知数据的加密、解密处理,增强无线传感网络安全性能。仿真结果表明,所提算法的加密、解密时间分别为1.01 s、1.05 s,解密成功率平均值为97.0%,RAM空间、ROM空间占用字节数分别为770 kB、800 kB,能耗为82 mJ。所提方法能够有效地保护无线传感网络数据的机密性和完整性,降低资源消耗。 展开更多
关键词 无线传感网络 轻量级加密算法 分簇模型 线性回归模型 感知数据采集
在线阅读 下载PDF
Analysis and Design for Unsymmetrical Block Encryption Algorithm
15
作者 王以刚 孔令飞 《Journal of China Textile University(English Edition)》 EI CAS 1999年第2期50-52,共3页
This article explains the imbalance in DES and introduces the operators in IDEA. At last it puts forward a Unsym-metrical Block Encryption Algorithm which is achieved by adding some operators to DES.
关键词 BLACK CIPHER CIPHER algorithm DES IDEA UNSYMMETRICAL block encryptION
在线阅读 下载PDF
基于混合算法的高维稀疏数据安全加密仿真 被引量:1
16
作者 张淑荣 李春平 《计算机仿真》 2025年第2期427-431,共5页
由于高维稀疏数据存在特征难提取、数据存在空值和缺失值等问题,导致对其安全加密难度较大。为了实现对高维稀疏数据安全加密,提出一种基于混合算法的数据安全加密方法。通过对高维稀疏数据值建立对象组,计算组内每个数据属性出现概率,... 由于高维稀疏数据存在特征难提取、数据存在空值和缺失值等问题,导致对其安全加密难度较大。为了实现对高维稀疏数据安全加密,提出一种基于混合算法的数据安全加密方法。通过对高维稀疏数据值建立对象组,计算组内每个数据属性出现概率,标记对象与属性值间相似性,取最大和最小相似性阈值作为参照,求解不同维度数据与阈值间所属关系。采用DES加密算法根据数据维度向量更改明文大小,实现高维和低维数据的密钥分配;利用ECC算法建立椭圆曲线和散列函数,计算数据点在曲线上的散列关系,设立发送端和接收端,通过求解数据在二者间数据稀疏性表达,给出适应度最高的密文,完成混合加密。实验结果表明,所提方法加密效果好,在数据量为1000GB时,其密文空间占比保持在7500B内。 展开更多
关键词 散列函数 高维稀疏数据 数据加密标准加密算法 纠错码加密算法 密钥分配
在线阅读 下载PDF
物联网混合传感节点数据存储二次增强加密方法设计
17
作者 龚发根 何拥军 钟少宏 《传感技术学报》 北大核心 2025年第11期2088-2093,共6页
物联网混合传感节点涵盖多个传感器,每个传感器的数据量庞大,且易包含大量敏感信息。为了提高物联网混合传感节点数据存储的安全性,提出一种物联网混合传感节点数据存储二次增强加密方法。采用神经网络和复合离散混沌系统,初始加密传感... 物联网混合传感节点涵盖多个传感器,每个传感器的数据量庞大,且易包含大量敏感信息。为了提高物联网混合传感节点数据存储的安全性,提出一种物联网混合传感节点数据存储二次增强加密方法。采用神经网络和复合离散混沌系统,初始加密传感器节点数据,结合AES算法和ECC算法,二次加密传感器节点数据。将密文、AES密钥块和签名块直接传输至接收端,实现物联网混合传感节点数据二次增强加密。仿真结果表明,所提方法的密钥生成时间和加密时间始终在280 ms以下,存储开销低于1.6×10^(4) byte,信息泄露比低于0.13,能够有效降低加密过程执行时间、数据存储开销和信息泄露比,保护物联网混合传感节点数据,提高物联网混合传感节点数据存储安全性。 展开更多
关键词 混合传感节点 增强加密 AES算法 ECC算法 物联网 数据存储
在线阅读 下载PDF
面向隐私信息泄露的光纤网络加密安全防护研究
18
作者 袁智勇 钟章生 熊飞龙 《激光杂志》 北大核心 2025年第5期196-202,共7页
受各种类型的攻击,包括窃听、篡改、拒绝服务等影响,使得光纤网络抗攻击能力较弱,而海量数据量和复杂性不断上升,无法确保隐私数据的密钥,从而造成信息泄露、篡改等严重后果。为了保障信息的机密性,提出面向隐私信息泄露的光纤网络加密... 受各种类型的攻击,包括窃听、篡改、拒绝服务等影响,使得光纤网络抗攻击能力较弱,而海量数据量和复杂性不断上升,无法确保隐私数据的密钥,从而造成信息泄露、篡改等严重后果。为了保障信息的机密性,提出面向隐私信息泄露的光纤网络加密安全防护研究。通过收发节点采集大量信道状态信息,对信道状态展开评估,并将量化参数设定为比特序列,提取光纤网络海量隐私信息中的密钥。根据密钥提取结果,组建隐私信息分段和分组密钥组,利用密钥匹配算法为各个分段以及分组选取可信密钥展开加密处理,并将加密处理后的隐私信息保存至云端,以此实现光纤网络海量隐私信息加密存储。实验结果表明,所提方法的加密时间保持在2.5 ms内,存储开销低且吞吐量高,能够抵御各种攻击,可以有效实现隐私信息的加密存储。 展开更多
关键词 隐私信息 光纤网络 信息加密 多可信密钥 密钥匹配算法 加密存储
原文传递
基于约瑟夫置乱和三维混沌的图像加密算法
19
作者 丁元明 朱安迪 冯建新 《计算机仿真》 2025年第3期226-230,共5页
针对传统图像加密算法密钥空间小,相邻像素相关性强,导致安全性低的问题提出一种新算法。首先用改进的约瑟夫算法的初始序列为明文图像进行按行优先与按列优先的置乱操作,并将置乱图像转换为一维序列。使用Sine耦合Logistic三维混沌映... 针对传统图像加密算法密钥空间小,相邻像素相关性强,导致安全性低的问题提出一种新算法。首先用改进的约瑟夫算法的初始序列为明文图像进行按行优先与按列优先的置乱操作,并将置乱图像转换为一维序列。使用Sine耦合Logistic三维混沌映射迭代初始值生成混沌序列,通过异或和取模运算对混沌序列和置乱序列进行扩散,得到加密图像。仿真结果表明,以上算法密钥空间大,密钥敏感,相邻像素间相关性弱,直方图分布均匀,信息熵大。因此,以上算法可抵抗穷举攻击、差分攻击和统计分析攻击,通过与其它算法比较可知,上述算法的加密效果更好且是安全有效的。 展开更多
关键词 图像加密 约瑟夫算法 置乱 三维混沌 扩散
在线阅读 下载PDF
计算机网络通信安全领域的加密算法
20
作者 韩坤 《通信电源技术》 2025年第7期186-188,共3页
加密算法是计算机网络通信安全的维护工具之一,在计算机网络通信安全领域具有广泛的应用。在分析加密算法的基础上,论述计算机网络通信安全中加密算法的作用,包括高级加密标准(Advanced Encryption Standard,AES)算法、蚁群优化算法、Pr... 加密算法是计算机网络通信安全的维护工具之一,在计算机网络通信安全领域具有广泛的应用。在分析加密算法的基础上,论述计算机网络通信安全中加密算法的作用,包括高级加密标准(Advanced Encryption Standard,AES)算法、蚁群优化算法、Present算法以及RSA算法,为加密算法在计算机网络通信安全领域的有效应用提供参考。 展开更多
关键词 计算机网络 通信安全 加密算法
在线阅读 下载PDF
上一页 1 2 109 下一页 到第
使用帮助 返回顶部