Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition) ›› 2019, Vol. 37 ›› Issue (3): 60-70.doi: 10.16088/j.issn.1001-6600.2019.03.007
ZHOU Ronglong,LUO Yuling*,BI Jinjie,CEN Mingcan,QIU Senhui,LIAO Zhixian
CLC Number:
[1] CHEN Junxin,ZHU Ziliang,FU Chong,et al.An efficient image encryption scheme using lookup table-based confusion and diffusion[J].Nonlinear Dynamics,2015,81(3):1151-1166.DOI:10.1007/s11071-015-2057-6. [2] WANG Xingyuan,ZHANG Huili.A color image encryption with heterogeneous bit-permutation and correlated chaos[J]. Optics Communications,2015,342:51-60.DOI:10.1016/j.optcom.2014.12.043. [3] BLAKLEY G R,BOROSH I.Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages[J]. Computers and Mathematics with Applications,1979,5(3):169-178.DOI:10.1016/0898-1221(79)90039-7. [4] YE Guodong,HUANG Xiaoling,ZHANG L Y,et al.A self-cited pixel summation based image encryption algorithm[J]. Chinese Physics B,2017,26(1):010501.DOI:10.1088/1674-1056/26/1/010501. [5] HUANG R,RHEE K H,UCHIDA S.A parallel image encryption method based on compressive sensing[J].Multimedia Tools and Applications,2014,72(1):71-93.DOI:10.1007/s11042-012-1337-0. [6] ENAYATIFAR R,ABDULLAH A H,ISNIN I F.Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence[J].Optics and Lasers in Engineering,2014,56:83-93.DOI:10.1016/j.optlaseng.2013.12.003. [7] WANG Xingyuan,LIU Chuanming,XU Dahai,et al.Image encryption scheme using chaos and simulated annealing algorithm[J].Nonlinear Dynamics,2016,84(3):1417-1429.DOI:10.1007/s11071-015-2579-y. [8] XIE K,WU P,YANG S.GPU and CPU cooperation parallel visualisation for large seismic data[J].Electronics Letters, 2010,46(17):1196-1197.DOI:10.1049/el.2010.1242. [9] LEE J,YI F,SAIFULLAH R,et al.Graphics processing unit-accelerated double random phase encoding for fast image encryption[J].Optical Engineering,2014,53(11):112308.DOI:10.1117/1.OE.53.11.112308. [10]LUO Yuling,ZHOU Ronglong,LIU Junxiu,et al.An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers[J].Multimedia Tools and Applications,2018,77(20):26191-26217.DOI: 10.1007/s11042-018-5844-5. [11]LUO Yuling,ZHOU Ronglong,LIU Junxiu,et al.A novel image encryption scheme based on Kepler’s third law and random Hadamard transform[J].Chinese Physics B,2017,26(12):120504.DOI:10.1088/1674-1056/26/12/120504. [12]SAIKUMAR N,KRISHNAN R B,MEGANATHAN S,et al.An encryption approach for security enhancement in images using key based partitioning technique[C]//2016 International Conference on Circuit,Power and Computing Technologies.Piscataway,NJ:IEEE Press,2016:1-4.DOI:10.1109/ICCPCT.2016.7530327. [13]ZHOU Guomin,ZHANG Daxing,LIU Yanjian,et al.A novel image encryption algorithm based on chaos and Line map[J].Neurocomputing,2015,169:150-157.DOI:10.1016/j.neucom.2014.11.095. [14]WANG Xingyuan,WANG Qian.A fast image encryption algorithm based on only blocks in cipher text[J].Chinese Physics B,2014,23(3):030503.DOI:10.1088/1674-1056/23/3/030503. [15]WANG Xingyuan,ZHAO Jianfeng,LIU Hongjun.A new image encryption algorithm based on chaos[J].Optics Communications,2012,285(5):562-566.DOI:10.1016/j.optcom.2011.10.098. [16]WU Jiahui,LIAO Xiaofeng,YANG Bo.Color image encryption based on chaotic systems and elliptic curve ElGamal scheme[J].Signal Processing,2017,141:109-124.DOI:10.1016/j.sigpro.2017.04.006. |
[1] | HUANG Hui-yun, PAN Jin-jing, ZHOU Yong-gen. Liu Shao-qi’s Social Security Thoughts and Practice during the Central Soviet Area Period [J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2017, 53(3): 46-50. |
[2] | ZHANG Cai-sheng. A Study on Southeast Asia’s Maritime Thoroughfare Security Under the Background of 21st Century Maritime Silk Route [J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2015, 51(6): 50-56. |
|