排序方式: 共有104条查询结果,搜索用时 15 毫秒
1.
An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree 下载免费PDF全文
This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree. Firstly, other programming software is used to perform the middle order traversal, and the plaintext image is sorted according to the middle order traversal sequence on the permutation. Secondly, the chaotic sequence is generated using the coupled map lattice to set the chaotic interference value. Finally, the XOR operation between the adjacent pixel values of the replacement image is completed to generate the ciphertext matrix. The simulation and experimental results show that the proposed algorithm can resist typical attacks and has good robustness. 相似文献
2.
本文提出了一种基于抖动和混沌技术的数字图像篡改检测及修复算法.该算法使用小波变换后的低频子图和抖动技术生成图像的认证及修复信息,在有效减少水印数据量的同时,将水印嵌入小波变换后的高频子图,从而达到水印的不可见性.运用混沌技术完成水印的嵌入和加密,并结合中国余数定理,进一步减少水印嵌入对图像质量的影响.实验证明,该算法兼顾了水印的不可见性和鲁棒性,并且能够一定程度修复篡改图像,在图像认证和修复方面具有较高的实用意义. 相似文献
3.
4.
Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices 下载免费PDF全文
A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recover the plaintext by applying the chosen plaintext attack. Therefore, the proposed cryptosystem is not secure enough to be used in the image transmission system. Experimental results show the feasibility of the attack. As a result, we make some improvements to the encryption scheme, which can completely resist our chosen plaintext attack. 相似文献
5.
An image block encryption scheme based on spatiotemporal chaos has been proposed recently.In this paper,we analyse the security weakness of the proposal.The main problem of the original scheme is that the generated keystream remains unchanged for encrypting every image.Based on the flaws,we demonstrate a chosen plaintext attack for revealing the equivalent keys with only 6 pairs of plaintext/ciphertext used.Finally,experimental results show the validity of our attack. 相似文献
6.
7.
由复映射z←zα+c(α<0)所构造的广义M-集的研究 总被引:24,自引:1,他引:23
阐述了构造复映射z←z^α c(α<0)所构造的广义Mandelbrot集(简单称M-集或M-分形图)的逃逸时间算法。通过改变参数α,作出了一系列有趣的分形图,这些分形图为若干卫星群环绕中央恒星的星群结构,定量地研究了恒星和卫星群的几何结构,并对α取非整数时分形图的结构特点和卫星群胚胎出现的原因进行了分析,最后给出几点结论。 相似文献
8.
9.
二维Logistic映射的分岔与分形 总被引:6,自引:0,他引:6
理论分析了二维Logistic映射的分岔,并采用相图、分岔图、功率谱、Lyapunov指数和分维数计算的方法,揭示出:二维Logistic映射可按倍周期分岔和Hopf分岔走向混沌;在倍周期分岔过程中,系统在参数空间和相空间中都表现出自相似性和尺度变换下的不变性.对二维Logistic映射的吸引盆及其Mandelbrot-Julia集(简称M-J集)的研究表明:吸引盆中周期和非周期区域之间的边界是分形的,这意味着无法预测相平面上点运动的归宿;M-J集的结构由控制参数决定,且它们的边界是分形的. 相似文献
10.