期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Image Encryption and Decryption Based on Chaotic Algorithm
1
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm image Encryption and decryption Two-Stage Logistic Mapping M Sequence
在线阅读 下载PDF
Digital image encryption with chaotic map lattices 被引量:8
2
作者 孙福艳 吕宗旺 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期132-138,共7页
This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels o... This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency. 展开更多
关键词 image encryption image decryption chaotic map lattice CRYPTOGRAPHY spatiotemporal chaotic system
原文传递
Recovery of Image through Alamouti Channel with Incorporation of RSA Algorithm
3
作者 Aninda Majumder Mohammad Raihan Ruhin +1 位作者 Tahsina Hashem Md. Imdadul Islam 《Journal of Computer and Communications》 2016年第2期1-10,共10页
In many applications, it is necessary to transmit images at a remote station, where wired Internet service is not available. In this case, wireless local loop (WLL) can help in making wireless link between one end nod... In many applications, it is necessary to transmit images at a remote station, where wired Internet service is not available. In this case, wireless local loop (WLL) can help in making wireless link between one end node of the internet and remote service center. In such link, the communication is heavily affected by large and small scale fading;hence the received signal experiences huge distortion in case of forward error correction. Otherwise, huge service delay arises due to frequent negative acknowledgements. To combat the situation, we can choose Alamouti channel of full rate and fully orthogonal space-time block code (OSTBC). Our aim is to transmit images through Alamouti channel and to observe the quality of the recovered image, in context of bit error rate (BER). We have also observed the impact of fading and additive white Gaussian noise (AWGN) on the image without application of error correction or detection technique of channel coding. To ensure security, we apply the RSA algorithm on each pixel prior transmitting and decrypt them at the receiving end, where we found no impairment from the algorithm. Finally, we observe that the relative performance of the system changes digital modulation schemes. 展开更多
关键词 Quotient and Remainder Matrix Alamouti Simulator Multiple-Input Single-Output (MISO) image Encryption and decryption BER and Discrete Wavelet Transform (DWT)
在线阅读 下载PDF
Quantum image encryption algorithm based on generalized Arnold transform and Logistic map
4
作者 Wen‑Wen Hu Ri‑Gui Zhou +2 位作者 SheXiang Jiang XingAo Liu Jia Luo 《CCF Transactions on High Performance Computing》 2020年第3期228-253,共26页
In the era of big data,image security and real-time processing become more and more important and increasingly difficult to satisfy.To improve the security and processing efficiency of image encryption algorithm,an en... In the era of big data,image security and real-time processing become more and more important and increasingly difficult to satisfy.To improve the security and processing efficiency of image encryption algorithm,an enhanced quantum scheme is proposed for generalized novel enhanced quantum image representation.The proposed quantum encryption scheme mainly consists of two-stage operation in order,i.e.,twice scrambling based generalized Arnold transform and pixel encryption based on the quantum key image(which are generated and prepared based on Logistic map).In the first stage,generalized Arnold transform are employed to simultaneously disturb the coordinate information and pixel gray value of quantum plain image.Following that,the scrambled image is further encrypted into a quantum cipher image based on quantum key image,which is divided into three sub-processes in detail,i.e.,CNOT operations,bit-plane scrambling and controlled perfect shuffle permutations are executed orderly.The quantum image decryption process can be easily implemented in a reverse way.The complete quantum circuit implementation for above two stages operation is constructed and analyzed in terms of quantum cost and time complexity.Compared to classical image processing algorithm,the investigated quantum encryption algorithm demonstrates an exponential speedup with computational cost of O(n)for a 2^(n)×2^(n) quantum grayscale or color images.The proposed scheme is simulated and verified on a classical computer with MATLAB environments,i.e.,not in a real quantum version that not considers the effects of quantum noise.Experimental results and numerical analysis indicate that the presented quantum algorithm has good visual effects and high security. 展开更多
关键词 Quantum computers image encryption/decryption Generalized arnold transform Logistic map Computational complexity
在线阅读 下载PDF
CHAOTIC SYNCHRONIZATION OF QUATERNIONIC NEURAL NETWORKS WITH TIME-VARYING DELAYS AND ITS APPLICATION IN CRYPTOSYSTEM
5
作者 Li Li Xudong Chen +2 位作者 Jing Liang Farong Kou Hongguang Pan 《Journal of Computational Mathematics》 2026年第1期213-231,共19页
For complex-valued or quaternionic neural networks,scholars and researchers usually decompose them into real-valued systems.The decomposed real-valued systems are equiv-alent to original systems.Then,the dynamical beh... For complex-valued or quaternionic neural networks,scholars and researchers usually decompose them into real-valued systems.The decomposed real-valued systems are equiv-alent to original systems.Then,the dynamical behaviors of real-valued systems obtained are investigated,including stability,synchronization,and chaos etc.In this paper,a class of quaternionic neural networks with time-varying delays is investigated.First,by designing a suitable PI controller,synchronization of the considered chaotic system is realized.By using a non-decomposition method and structuring a novel Lyapunov functional,sufficient conditions are derived to guarantee synchronization between the drive-response systems.It is worth mentioning that,unlike other methods,our approach does not require break-ing down the quaternionic neural networks into four separate real-valued systems.Fur-thermore,we demonstrate the practical application of these chaotic quaternionic neural networks with time-varying delays in image encryption and decryption.Based on one se-quence of chaotic signal from state trajectory of single quaternion-valued neuron and a new encryption algorithm,the application of chaotic system proposed,that is,image encryp-tion,is researched.The process of image decryption is simply the reverse of the encryption process.Finally,numerical simulation examples are provided to validate the effectiveness of the designed PI controller and performance of image encryption and decryption. 展开更多
关键词 Quaternionic Neural network Chaotic synchronization image encryption and decryption Time-varying delays
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部