期刊文献+
共找到1,062篇文章
< 1 2 54 >
每页显示 20 50 100
Secure property of chaotic encryption system based on chaotic synchronization
1
作者 崔光亮 胡国杰 冯正进 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第1期57-62,共6页
The secure property of chaotic encryption system based on chaos synchronization from chosenciphertext attack under Kerckhoff principle is discussed. The key (parameter) of the receiver can be obtained by chosenciphert... The secure property of chaotic encryption system based on chaos synchronization from chosenciphertext attack under Kerckhoff principle is discussed. The key (parameter) of the receiver can be obtained by chosenciphertext attack. The encryption systems based on chaotic synchronization do not have high privacy. 展开更多
关键词 CHAOS chaos synchronization encryption system kerckhoff principle chosenciphertext attack
在线阅读 下载PDF
A Complex Encryption System Design Implemented by AES 被引量:1
2
作者 Zhimao Lu Houmed Mohamed 《Journal of Information Security》 2021年第2期177-187,共11页
With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security pr... With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security protocol and cryptographic algorithm and the latter is the foundation and core technology of information security. Advanced Encryption Standard (AES) encryption algorithm is one of the most commonly used algorithms in symmetric encryption algorithms. Such algorithms face issues when used in the context of key management and security functions. This paper focuses on the systematic analysis of these issues and summarizes AES algorithm implementation, comprehensive application and algorithm comparison with other existing methods. To analyze the performance of the proposed algorithm and to make full use of the advantages of AES encryption algorithm, one needs to reduce round key and improve the key schedule, as well as organically integrate with RSA algorithm. Java language is used to implement the algorithm due to its large library, then to show the efficiency of the proposed method we compare different parameters, such as encryption/decryption speed, entropies and memory consumption...) with a classic algorithm. Based on the results of the comparison between AES and the hybrid AES algorithm, the proposed algorithm shows good performance and high security. It therefore can be used for key management and security functions, particularly for sharing sensitive files through insecure channel. This analysis provides a reference useful for selecting different encryption algorithms according to different business needs. 展开更多
关键词 AES Algorithm RSA Algorithm encryption Key Management
在线阅读 下载PDF
Dynamically Reconfigurable Encryption System of the AES
3
作者 WANG Youren WANG Li YAO Rui ZHANG Zhai CUI Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1569-1572,共4页
Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption S... Reconfigurable computing has grown to become an important and large field of research, it offers advantages over traditional hardware and software implementations of computational algorithms. The Advanced Encryption Standard (AES) algorithm is widely applied in government department and commerce. This paper analyzed the AES algorithms with different cipher keys, adopted a novel key scheduler that generated the round key real-time, proposed a dynamically reconfigurable encryption system which supported the AES algorithm with different cipher keys, and designed the architecture of the reconfigurable system. The dynamically reconfigurable AES system had been realized on FPGA. The result proves that the reconfigurable AES system is flexible, lower cost and high security level. 展开更多
关键词 dynamically reconfigurable hardware field programmable gate array (FPGA) advanced encryption standard (AES) algorithm cipher key
在线阅读 下载PDF
Searchable Encryption System for Big Data Storage
4
作者 Yuxiang Chen Yao Hao +3 位作者 Zhongqiang Yi Kaijun Wu Qi Zhao Xue Wang 《国际计算机前沿大会会议论文集》 2021年第2期139-150,共12页
Big data cloud platforms provide users with on-demand configurable computing,storage resources to users,thus involving a large amount of user data.However,most of the data is processed and stored in plaintext,resultin... Big data cloud platforms provide users with on-demand configurable computing,storage resources to users,thus involving a large amount of user data.However,most of the data is processed and stored in plaintext,resulting in data leakage.At the same time,simple encrypted storage ensures the confidentiality of the cloud data,but has the following problems:if the encrypted data is downloaded to the client and then decrypted,the search efficiency will be low.If the encrypted data is decrypted and searched on the server side,the security will be reduced.Data availability is finally reduced,and indiscriminate protection measures make the risk of data leakage uncontrollable.To solve the problems,based on searchable encryption and key derivation,a cipher search system is designed in this paper considering both data security and availability,and the use of a search encryption algorithm that supports dynamic update is listed.Moreover,the system structure has the advantage of adapting different searchable encryption algorithm.In particular,a user-centered key derivation mechanism is designed to realize file-level fine-grained encryption.Finally,extensive experiment and analysis show that the scheme greatly improves the data security of big data platform. 展开更多
关键词 Big data platform Searchable encryption FINE-GRAINED Secure storage
原文传递
A geographic information encryption system based on Chaos-LSTM and chaos sequence proliferation 被引量:1
5
作者 Jia DUAN Luanyun HU +2 位作者 Qiumei XIAO Meiting LIU Wenxin YU 《Frontiers of Information Technology & Electronic Engineering》 2025年第3期427-440,共14页
In response to the strong correlation between the chaotic system state and initial state and parameters in traditional chaotic encryption algorithms, which may lead to periodicity in chaotic sequences, the chaos long ... In response to the strong correlation between the chaotic system state and initial state and parameters in traditional chaotic encryption algorithms, which may lead to periodicity in chaotic sequences, the chaos long short-term memory(Chaos-LSTM) model is constructed by combining chaotic systems with LSTM neural networks. The chaos sequence proliferation(CSP) algorithm is constructed to address the problem that the limited computational accuracy of computers can lead to periodicity in long chaotic sequences, making them unsuitable for encrypting objects with large amounts of data. By combining the Chaos-LSTM model and CSP algorithm, a geographic information encryption system is proposed. First, the Chaos-LSTM model is used to output chaotic sequences with high spectral entropy(SE) complexity. Then, a shorter chaotic sequence is selected and proliferated using the CSP algorithm to generate chaotic proliferation sequences that match the encrypted object;a randomness analysis is conducted and testing is performed on it. Finally, using geographic images as encryption objects, the chaotic proliferation sequence, along with the scrambling and diffusion algorithms, are combined to form the encryption system, which is implemented on the ZYNQ platform. The system's excellent confidentiality performance and scalability are proved by software testing and hardware experiments, making it suitable for the confidentiality peers of various encryption objects with outstanding application value. 展开更多
关键词 CHAOS Long short-term memory(LSTM) Chaos sequence proliferation(CSP) ZYNQ platform Image encryption
原文传递
Enhancing Post-Quantum Information Security: A Novel Two-Dimensional Chaotic System for Quantum Image Encryption
6
作者 Fatima Asiri Wajdan Al Malwi 《Computer Modeling in Engineering & Sciences》 2025年第5期2053-2077,共25页
Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematica... Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications. 展开更多
关键词 Information security chaotic map modeling post-quantum security quantum image encryption chaotic map image encryption
在线阅读 下载PDF
A Recursive Method to Encryption-Decryption-Based Distributed Set-Membership Filtering for Time-Varying Saturated Systems Over Sensor Networks
7
作者 Jun Hu Jiaxing Li +2 位作者 Chaoqing Jia Xiaojian Yi Hongjian Liu 《IEEE/CAA Journal of Automatica Sinica》 2025年第5期1047-1049,共3页
Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decrypt... Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided. 展开更多
关键词 time varying saturated systems signal transmission processspecificallya encryption decryption mechanism sensor networks recursive method distributed set membership filtering
在线阅读 下载PDF
An efficient conjunctive keyword searchable encryption for cloud-based IoT systems
8
作者 Tianqi Peng Bei Gong +4 位作者 Chong Guo Akhtar Badshah Muhammad Waqas Hisham Alasmary Sheng Chen 《Digital Communications and Networks》 2025年第4期1292-1303,共12页
Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabli... Data privacy leakage has always been a critical concern in cloud-based Internet of Things(IoT)systems.Dynamic Symmetric Searchable Encryption(DSSE)with forward and backward privacy aims to address this issue by enabling updates and retrievals of ciphertext on untrusted cloud server while ensuring data privacy.However,previous research on DSSE mostly focused on single keyword search,which limits its practical application in cloud-based IoT systems.Recently,Patranabis(NDSS 2021)[1]proposed a groundbreaking DSSE scheme for conjunctive keyword search.However,this scheme fails to effectively handle deletion operations in certain circumstances,resulting in inaccurate query results.Additionally,the scheme introduces unnecessary search overhead.To overcome these problems,we present CKSE,an efficient conjunctive keyword DSSE scheme.Our scheme improves the oblivious shared computation protocol used in the scheme of Patranabis,thus enabling a more comprehensive deletion functionality.Furthermore,we introduce a state chain structure to reduce the search overhead.Through security analysis and experimental evaluation,we demonstrate that our CKSE achieves more comprehensive deletion functionality while maintaining comparable search performance and security,compared to the oblivious dynamic cross-tags protocol of Patranabis.The combination of comprehensive functionality,high efficiency,and security makes our CKSE an ideal choice for deployment in cloud-based IoT systems. 展开更多
关键词 Symmetric searchable encryption Conjunctive keyword search Forward and backward privacy Cloud server
在线阅读 下载PDF
Non-Deterministic Symmetric Encryption Communication System Based on Generative Adversarial Networks
9
作者 Wu Xuguang Han Yiliang +2 位作者 Zhang Minqing Zhu Shuaishuai Li Yu 《China Communications》 2025年第5期273-284,共12页
Symmetric encryption algorithms learned by the previous proposed end-to-end adversarial network encryption communication systems are deterministic.With the same key and same plaintext,the deterministic algorithm will ... Symmetric encryption algorithms learned by the previous proposed end-to-end adversarial network encryption communication systems are deterministic.With the same key and same plaintext,the deterministic algorithm will lead to the same ciphertext.This means that the key in the deterministic encryption algorithm can only be used once,thus the encryption is not practical.To solve this problem,a nondeterministic symmetric encryption end-to-end communication system based on generative adversarial networks is proposed.We design a nonce-based adversarial neural network model,where a“nonce”standing for“number used only once”is passed to communication participants,and does not need to be secret.Moreover,we optimize the network structure through adding Batch Normalization(BN)to the CNNs(Convolutional Neural Networks),selecting the appropriate activation functions,and setting appropriate CNNs parameters.Results of experiments and analysis show that our system can achieve non-deterministic symmetric encryption,where Alice encrypting the same plaintext with the key twice will generate different ciphertexts,and Bob can decrypt all these different ciphertexts of the same plaintext to the correct plaintext.And our proposed system has fast convergence and the correct rate of decryption when the plaintext length is 256 or even longer. 展开更多
关键词 end-to-end communication systems generative adversarial networks symmetric encryption
在线阅读 下载PDF
A New Image Encryption Algorithm Based on Cantor Diagonal Matrix and Chaotic Fractal Matrix
10
作者 Hongyu Zhao Shengsheng Wang 《Computers, Materials & Continua》 2026年第1期636-660,共25页
Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes ... Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes a novel image encryption algorithm specifically designed for grayscale image security.This research introduces a new Cantor diagonal matrix permutation method.The proposed permutation method uses row and column index sequences to control the Cantor diagonal matrix,where the row and column index sequences are generated by a spatiotemporal chaotic system named coupled map lattice(CML).The high initial value sensitivity of the CML system makes the permutation method highly sensitive and secure.Additionally,leveraging fractal theory,this study introduces a chaotic fractal matrix and applies this matrix in the diffusion process.This chaotic fractal matrix exhibits selfsimilarity and irregularity.Using the Cantor diagonal matrix and chaotic fractal matrix,this paper introduces a fast image encryption algorithm involving two diffusion steps and one permutation step.Moreover,the algorithm achieves robust security with only a single encryption round,ensuring high operational efficiency.Experimental results show that the proposed algorithm features an expansive key space,robust security,high sensitivity,high efficiency,and superior statistical properties for the ciphered images.Thus,the proposed algorithm not only provides a practical solution for secure image transmission but also bridges fractal theory with image encryption techniques,thereby opening new research avenues in chaotic cryptography and advancing the development of information security technology. 展开更多
关键词 Image encryption spatiotemporal chaotic system chaotic fractal matrix cantor diagonal matrix
在线阅读 下载PDF
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System 被引量:20
11
作者 Mamta Brij B.Gupta +3 位作者 Kuan-Ching Li Victor C.M.Leun Kostas E.Psannis Shingo Yamaguchi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1877-1890,共14页
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved... The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved by keeping it in an encrypted form,but it affects usability and flexibility in terms of effective search.Attribute-based searchable encryption(ABSE)has proven its worth by providing fine-grained searching capabilities in the shared cloud storage.However,it is not practical to apply this scheme to the devices with limited resources and storage capacity because a typical ABSE involves serious computations.In a healthcare cloud-based cyber-physical system(CCPS),the data is often collected by resource-constraint devices;therefore,here also,we cannot directly apply ABSE schemes.In the proposed work,the inherent computational cost of the ABSE scheme is managed by executing the computationally intensive tasks of a typical ABSE scheme on the blockchain network.Thus,it makes the proposed scheme suitable for online storage and retrieval of personal health data in a typical CCPS.With the assistance of blockchain technology,the proposed scheme offers two main benefits.First,it is free from a trusted authority,which makes it genuinely decentralized and free from a single point of failure.Second,it is computationally efficient because the computational load is now distributed among the consensus nodes in the blockchain network.Specifically,the task of initializing the system,which is considered the most computationally intensive,and the task of partial search token generation,which is considered as the most frequent operation,is now the responsibility of the consensus nodes.This eliminates the need of the trusted authority and reduces the burden of data users,respectively.Further,in comparison to existing decentralized fine-grained searchable encryption schemes,the proposed scheme has achieved a significant reduction in storage and computational cost for the secret key associated with users.It has been verified both theoretically and practically in the performance analysis section. 展开更多
关键词 Cloud-based cyber-physical systems(CCPS) data encryption healthcare information search and retrieval keyword search public-key cryptosystems searchable encryption
在线阅读 下载PDF
A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system 被引量:21
12
作者 王震 黄霞 +1 位作者 李玉霞 宋晓娜 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第1期124-130,共7页
We propose a new image encryption algorithm on the basis of the fractional-order hyperchaotic Lorenz system. While in the process of generating a key stream, the system parameters and the derivative order are embedded... We propose a new image encryption algorithm on the basis of the fractional-order hyperchaotic Lorenz system. While in the process of generating a key stream, the system parameters and the derivative order are embedded in the proposed algorithm to enhance the security. Such an algorithm is detailed in terms of security analyses, including correlation analysis, information entropy analysis, run statistic analysis, mean-variance gray value analysis, and key sensitivity analysis. The experimental results demonstrate that the proposed image encryption scheme has the advantages of large key space and high security for practical image encryption. 展开更多
关键词 image encryption fractional order hyperchaotic Lorenz system
原文传递
Image encryption using high-dimension chaotic system 被引量:14
13
作者 孙福艳 刘树堂 吕宗旺 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第12期3616-3623,共8页
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. This paper proposes a new approach for image encryption based on a hi... In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. This paper proposes a new approach for image encryption based on a high-dimensional chaotic map. The new scheme employs the Cat map to shuffle the positions, then to confuse the relationship between the cipher-image and the plain-image using the high-dimensional Lorenz chaotic map preprocessed. The results of experimental, statistical analysis and key space analysis show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission. 展开更多
关键词 Arnold cat map image encryption chaotic encryption
原文传递
An Image Encryption Algorithm Based on BP Neural Network and Hyperchaotic System 被引量:10
14
作者 Feifei Yang Jun Mou +1 位作者 Yinghong Cao Ran Chu 《China Communications》 SCIE CSCD 2020年第5期21-28,共8页
To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryption algorithm based... To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryption algorithm based on fractional-order memristive hyperchaotic system and BP neural network is proposed. In this algorithm, the image pixel values are compressed by BP neural network, the chaotic sequences of the fractional-order memristive hyperchaotic system are used to diffuse the pixel values. The experimental simulation results indicate that the proposed algorithm not only can effectively compress and encrypt image, but also have better security features. Therefore, this work provides theoretical guidance and experimental basis for the safe transmission and storage of image information in practical communication. 展开更多
关键词 BP neural network fractional-order hyperchaotic system image encryption algorithm secure communication
在线阅读 下载PDF
A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations 被引量:4
15
作者 张立民 孙克辉 +1 位作者 刘文浩 贺少波 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第10期98-106,共9页
In this paper, Adomian decomposition method (ADM) with high accuracy and fast convergence is introduced to solve the fractional-order piecewise-linear (PWL) hyperchaotic system. Based on the obtained hyperchaotic ... In this paper, Adomian decomposition method (ADM) with high accuracy and fast convergence is introduced to solve the fractional-order piecewise-linear (PWL) hyperchaotic system. Based on the obtained hyperchaotic sequences, a novel color image encryption algorithm is proposed by employing a hybrid model of bidirectional circular permutation and DNA masking. In this scheme, the pixel positions of image are scrambled by circular permutation, and the pixel values are substituted by DNA sequence operations. In the DNA sequence operations, addition and substraction operations are performed according to traditional addition and subtraction in the binary, and two rounds of addition rules are used to encrypt the pixel values. The simulation results and security analysis show that the hyperchaotic map is suitable for image encryption, and the proposed encryption algorithm has good encryption effect and strong key sensitivity. It can resist brute-force attack, statistical attack, differential attack, known-plaintext, and chosen-plaintext attacks. 展开更多
关键词 color image encryption DNA sequence operation fractional calculus piecewise-linear hyperchaotic system
原文传递
A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system 被引量:3
16
作者 柴秀丽 甘志华 +2 位作者 路杨 张苗辉 陈怡然 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第10期76-88,共13页
Recently, many image encryption algorithms based on chaos have been proposed. Most of the previous algorithms encrypt components R, G, and B of color images independently and neglect the high correlation between them.... Recently, many image encryption algorithms based on chaos have been proposed. Most of the previous algorithms encrypt components R, G, and B of color images independently and neglect the high correlation between them. In the paper, a novel color image encryption algorithm is introduced. The 24 bit planes of components R, G, and B of the color plain image are obtained and recombined into 4 compound bit planes, and this can make the three components affect each other. A four-dimensional(4D) memristive hyperchaotic system generates the pseudorandom key streams and its initial values come from the SHA 256 hash value of the color plain image. The compound bit planes and key streams are confused according to the principles of genetic recombination, then confusion and diffusion as a union are applied to the bit planes,and the color cipher image is obtained. Experimental results and security analyses demonstrate that the proposed algorithm is secure and effective so that it may be adopted for secure communication. 展开更多
关键词 genetic recombination memristive hyperchaotic system color image encryption CONFUSION DIFFUSION
原文传递
An Inner Product Encryption Scheme Based on Dual Systems 被引量:2
17
作者 WEI Duo GAO Haiying 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第2期125-133,共9页
The inner product encryption scheme can achieve fine-grained access control on ciphertext. For the problem that the existing inner product encryption scheme has poor security and low decryption efficiency, this paper ... The inner product encryption scheme can achieve fine-grained access control on ciphertext. For the problem that the existing inner product encryption scheme has poor security and low decryption efficiency, this paper proposes an inner product encryption scheme with adaptive security based on the dual system encryption method. The scheme is based on bilinear mapping on prime order groups. In the secret key generation algorithm of the scheme, we propose a sharing technique of random vectors and generate a secret key for each component of the attribute vector. And an encryption algorithm with a constant size ciphertext is designed. Under the k-Lin assumption, the method of the experimental sequence is used to prove that the scheme is adaptively secure. The decryption algorithm of the scheme requires only six bilinear pairs. Compared with the existing schemes, the decryption efficiency has been greatly improved. 展开更多
关键词 prime-order dual system groups INNER product encryption k-Lin ASSUMPTION adaptively secure
原文传递
Application of Evolutionary Encryption 2D Barcode Generation Technology in Agricultural Product Quality and Safety Traceability System 被引量:4
18
作者 Xiaojun ZHONG Zhijie LAI +3 位作者 Yan CHEN Jianxin QIAN Xiaocong HONG Caiyi LI 《Asian Agricultural Research》 2014年第8期76-79,共4页
Two-dimensional(2D) barcode technology is an electronic tagging technology based on combination of computer and optical technology. It is an important way of information collection and input. 2D barcode technology has... Two-dimensional(2D) barcode technology is an electronic tagging technology based on combination of computer and optical technology. It is an important way of information collection and input. 2D barcode technology has been widely used in various fields of logistics,production automation,and e-commerce,but it also has brought about a series of safety problems. Based on evolutionary encryption technology,this paper improved algorithm of traditional 2D barcode generation,to improve forgery- proof performance of 2D barcode. This algorithm is applied to agricultural products quality and safety traceability system and the results show that it is effective. 展开更多
关键词 2D BARCODE TECHNOLOGY EVOLUTIONARY encryption Trac
在线阅读 下载PDF
Neural-mechanism-driven image block encryption algorithm incorporating a hyperchaotic system and cloud model 被引量:2
19
作者 Peng-Fei Fang Han Liu +1 位作者 Cheng-Mao Wu Min Liu 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第4期175-190,共16页
An image encryption algorithm is proposed in this paper based on a new four-dimensional hyperchaotic system,a neural mechanism,a Galois field and an improved Feistel block structure,which improves the efficiency and e... An image encryption algorithm is proposed in this paper based on a new four-dimensional hyperchaotic system,a neural mechanism,a Galois field and an improved Feistel block structure,which improves the efficiency and enhances the security of the encryption algorithm.Firstly,a four-dimensional hyperchaotic system with a large key space and chaotic dynamics performance is proposed and combined with a cloud model,in which a more complex and random sequence is constructed as the key stream,and the problem of chaotic periodicity is solved.Then,the key stream is combined with the neural mechanism,Galois field and improved Feistel block structure to scramble and diffuse the image encryption.Finally,the experimental results and security analysis show that the encryption algorithm has a good encryption effect and high encryption efficiency,is secure,and can meet the requirements of practical applications. 展开更多
关键词 image encryption neural mechanism hyperchaotic system
原文传递
Medical Image Encryption Based on Josephus Traversing and Hyperchaotic Lorenz System 被引量:2
20
作者 杨娜 张淑霞 +1 位作者 白牡丹 李珊珊 《Journal of Shanghai Jiaotong university(Science)》 EI 2024年第1期91-108,共18页
This study proposes a new medical image encryption scheme based on Josephus traversing and hyper-chaotic Lorenz system.First,a chaotic sequence is generated through hyperchaotic system.This hyperchaotic sequence is us... This study proposes a new medical image encryption scheme based on Josephus traversing and hyper-chaotic Lorenz system.First,a chaotic sequence is generated through hyperchaotic system.This hyperchaotic sequence is used in the scrambling and diffusion stages of the algorithm.Second,in the scrambling process,the image is initially confused by Josephus scrambling,and then the image is further confused by Arnold map.Finally,generated hyperchaos sequence and exclusive OR operation is used for the image to carry on the positive and reverse diffusion to change the pixel value of the image and further hide the effective information of the image.In addition,the information of the plaintext image is used to generate keys used in the algorithm,which increases the ability of resisting plaintext attack.Experimental results and security analysis show that the scheme can effectively hide plaintext image information according to the characteristics of medical images,and is resistant to common types of attacks.In addition,this scheme performs well in the experiments of robustness,which shows that the scheme can solve the problem of image damage in telemedicine.It has a positive significance for the future research. 展开更多
关键词 medical image image encryption Josephus traversing hyperchaotic Lorenz system
原文传递
上一页 1 2 54 下一页 到第
使用帮助 返回顶部