Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital ...Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin, and decrypts the ciphertext. The scheme can encrypt and decz:Fpt most formatted digital RGB images recognized by computers, and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space, sensitivity of key parameters, and correlation of encrypted images imply that this scheme has sound security.展开更多
The authors regret that a mistake occurred during the presentation of Supporting Information Fig.S1B,in which we put the wrong picture during submission.This correction does not significantly impact the findings and c...The authors regret that a mistake occurred during the presentation of Supporting Information Fig.S1B,in which we put the wrong picture during submission.This correction does not significantly impact the findings and conclusions of the paper.The authors would like to assure readers that the corrected image does not alter the validity of the research.The original data of these figures have been provided to the Editorial Office,and the corresponding author can be contacted for original data access.展开更多
The authors discovered that Fig.4H and Fig.S3H in the published article contained incorrect images during the process of using AI tools to check published images.After carefully checking the original data,this was due...The authors discovered that Fig.4H and Fig.S3H in the published article contained incorrect images during the process of using AI tools to check published images.After carefully checking the original data,this was due to their unintended negligence during the extraction and handling of a large volume of experimental data in the process of assembling figures.The authors have replaced the incorrect images with the correct representative images.The updated Fig.4H and Fig.S3H are provided below.The original data of the figures have been provided to the Editorial Office,and the corresponding authors or the Editorial Office can be contacted for original data access.展开更多
The authors regret Fig.5C in the published article contained an incorrect image.Specifically,the image for the MHCC97H(pLVX-Puro)/DC group was mistakenly used during copying and pasting in the process of assembling th...The authors regret Fig.5C in the published article contained an incorrect image.Specifically,the image for the MHCC97H(pLVX-Puro)/DC group was mistakenly used during copying and pasting in the process of assembling the figure.This correction has no influence on the readers'understanding of the article.The original data of the figures have been provided to the Editorial Office,and the corresponding authors or the Editorial Office can be contacted for original data access.展开更多
基金the National Natural Science Foundation of China under,the Foundation for University Key Teachers,高等学校博士学科点专项科研项目,教育部科学技术研究项目
文摘Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin, and decrypts the ciphertext. The scheme can encrypt and decz:Fpt most formatted digital RGB images recognized by computers, and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space, sensitivity of key parameters, and correlation of encrypted images imply that this scheme has sound security.
文摘The authors regret that a mistake occurred during the presentation of Supporting Information Fig.S1B,in which we put the wrong picture during submission.This correction does not significantly impact the findings and conclusions of the paper.The authors would like to assure readers that the corrected image does not alter the validity of the research.The original data of these figures have been provided to the Editorial Office,and the corresponding author can be contacted for original data access.
文摘The authors discovered that Fig.4H and Fig.S3H in the published article contained incorrect images during the process of using AI tools to check published images.After carefully checking the original data,this was due to their unintended negligence during the extraction and handling of a large volume of experimental data in the process of assembling figures.The authors have replaced the incorrect images with the correct representative images.The updated Fig.4H and Fig.S3H are provided below.The original data of the figures have been provided to the Editorial Office,and the corresponding authors or the Editorial Office can be contacted for original data access.
文摘The authors regret Fig.5C in the published article contained an incorrect image.Specifically,the image for the MHCC97H(pLVX-Puro)/DC group was mistakenly used during copying and pasting in the process of assembling the figure.This correction has no influence on the readers'understanding of the article.The original data of the figures have been provided to the Editorial Office,and the corresponding authors or the Editorial Office can be contacted for original data access.