Computer Science ›› 2022, Vol. 49 ›› Issue (8): 344-349.doi: 10.11896/jsjkx.210700235
• Information Security • Previous Articles
ZHOU Lian-bing1, ZHOU Xiang-zhen2, CUI Xue-rong3
CLC Number:
[1]ZHANG S,GAO T G.An image encryption scheme based on DNA coding and permutation of hyper-image [J].Multimedia Tools and Applications,2016,75(24):17157-17170. [2]RAMANATHAN T,HOSSEN M J,SAYEED M S,et al.Survey on computational intelligence based image encryption techniques[J].Indonesian Journal of Electrical Engineering and Computer Science,2020,19(3):1428-1435. [3]FATMA Y,HAFID A,DANI H O.Peningkatan keamanan pengiriman pesan teks:kombinasi advanced encryption standard(AES) 128 dan least significant bit(LSB)[J].JUSIFO (Jurnal Sistem Informasi),2020,6(2):111-120. [4]IKHWAN A,RAOF R,EHKAN P,et al.Data security implementation using data encryption standard method for student values at the faculty of medicine,University of North Sumatra[J].Journal of Physics:Conference Series,2021,1755(1):22-33. [5]YE G D,HUANG X L.An efficient symmetric image encryption algorithm based on an intertwining logistic map [J].Neurocomputing,2017,251(19):45-53. [6]MAO J,WANG H Y,CHEN Y.Image encryption algorithmbased on dynamic key selection and multi-direction diffusion[J].Optical Technique,2018,44(3):278-286. [7]ELAMIR M M,TABANY W I,MAI S M.Hybrid image en-cryption scheme for secure E-health systems[J].Network Mo-deling Analysis in Health Informatics and Bioinformatics,2021,10(1):1727-1744. [8]DING L N,DING Q.A novel image encryption scheme based on 2D fractional chaotic map,DWT and 4D hyper-chaos[J].Electronics,2020,9(8):1280-1299. [9]LI C,LUO G,LI C.An image encryption scheme based on the three-dimensional chaotic logistic map[J].International Journal of Network Security,2019,21(1):22-29. [10]HAN S M,ZHANG W,ZHANG X,et al.Multiple image encryption method based on light field imaging theory and chaotic system[J].Acta Photonica Sinica,2020,49(3):193-202. [11]SAMAR M I,LOBNA A,AHMED A R,et al.Biomedical image encryption based on double-humped and fractional logistic maps[C]//2017 6th International Conference on Modern Circuits and Systems Technologies(MOCAST).IEEE press,2017:112-123. [12]LI M,ZHOU K,REN H,et al.Cryptanalysis of permutation-diffusion-based lightweight chaotic image encryption scheme using CPA[J].Applied Sciences,2019,9(3):95-104. [13]XIAN Y J,XIE S J,TU Y L.Multi-image encryption algorithm based on hyper-chaotic system [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(6):1065-1074. [14]LIU Z,WANG Y.Image compression and encryption schemebased on the two-dimensional coupled map lattice model [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(6):1048-1057. [15]YAN X X,ZHANG Q C YANG C C.Weighted attribute-based encryption scheme with traitor tracing [J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(6):1058-1064. [16]LI M,XU M,LUO J,et al.Cryptanalysis of an image encryption using 2D Henon-sine map and DNA approach[J].IEEE Access,2019,52(7):63336-63345. [17]JRIDI M,MEHER P K.Scalable approximate DCT architec-tures for effcient HEVC-compliant video coding[J].IEEE Trans. Circuits. Syst. Video Technol.,2017,27(8):1815-1825. [18]SHIHABH S,SUHAIDI S,ABDUL R R,et al.Enhancement of satellite image compression using a hybrid(DWT-DCT) algorithm[J].Sensing & Imaging,2017,18(1):30-41. [19]EEAYATIFARA R,ABDULLAHB A,ISMAIL F I.Image encryption using a synchronous permutation diffusion technique[J].Optics and Lasers in Engineering,2017,90(6):146-154. [20]WU Y,ZHOU Y,SAVERIADES G,et al.Local shannon entropy measure with statistical tests for image randomness[J].Information Science,2013,222(12):323-342. [21]ZHANG Y.A Chaotic system based image encryption schemewith identical encryption and decryption algorithm[J].Chinese Journal of Electronics,2017,26(5):1022-1031. [22]MOAFIMADANI S S, CHEN Y,TANG C.A new algorithm for medical color images encryption using chaotic systems[J].Entropy,2019,21(6):577-186. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[3] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
[4] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[5] | LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke. Secure Coordination Model for Multiple Unmanned Systems [J]. Computer Science, 2022, 49(7): 332-339. |
[6] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[7] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[8] | JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479. |
[9] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
[10] | YUAN Hao-nan, WANG Rui-jin, ZHENG Bo-wen, WU Bang-yan. Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric [J]. Computer Science, 2022, 49(6A): 490-495. |
[11] | HUANG Hua-wei, LI Chun-hua. Security Analysis of A Key Exchange Protocol Based on Tropical Semi-ring [J]. Computer Science, 2022, 49(6A): 571-574. |
[12] | LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593. |
[13] | Renata WONG. Application of Early Quantum Algorithms in Quantum Communication,Error Correction and Other Fields [J]. Computer Science, 2022, 49(6A): 645-648. |
[14] | YU Jia-qi, KANG Xiao-dong, BAI Cheng-cheng, LIU Han-qing. New Text Retrieval Model of Chinese Electronic Medical Records [J]. Computer Science, 2022, 49(6A): 32-38. |
[15] | DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108. |
|