Journal of Guangxi Normal University(Natural Science Edition) ›› 2019, Vol. 37 ›› Issue (3): 60-70.doi: 10.16088/j.issn.1001-6600.2019.03.007
Previous Articles Next Articles
ZHOU Ronglong,LUO Yuling*,BI Jinjie,CEN Mingcan,QIU Senhui,LIAO Zhixian
CLC Number:
[1] CHEN Junxin,ZHU Ziliang,FU Chong,et al.An efficient image encryption scheme using lookup table-based confusion and diffusion[J].Nonlinear Dynamics,2015,81(3):1151-1166.DOI:10.1007/s11071-015-2057-6. [2] WANG Xingyuan,ZHANG Huili.A color image encryption with heterogeneous bit-permutation and correlated chaos[J]. Optics Communications,2015,342:51-60.DOI:10.1016/j.optcom.2014.12.043. [3] BLAKLEY G R,BOROSH I.Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages[J]. Computers and Mathematics with Applications,1979,5(3):169-178.DOI:10.1016/0898-1221(79)90039-7. [4] YE Guodong,HUANG Xiaoling,ZHANG L Y,et al.A self-cited pixel summation based image encryption algorithm[J]. Chinese Physics B,2017,26(1):010501.DOI:10.1088/1674-1056/26/1/010501. [5] HUANG R,RHEE K H,UCHIDA S.A parallel image encryption method based on compressive sensing[J].Multimedia Tools and Applications,2014,72(1):71-93.DOI:10.1007/s11042-012-1337-0. [6] ENAYATIFAR R,ABDULLAH A H,ISNIN I F.Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence[J].Optics and Lasers in Engineering,2014,56:83-93.DOI:10.1016/j.optlaseng.2013.12.003. [7] WANG Xingyuan,LIU Chuanming,XU Dahai,et al.Image encryption scheme using chaos and simulated annealing algorithm[J].Nonlinear Dynamics,2016,84(3):1417-1429.DOI:10.1007/s11071-015-2579-y. [8] XIE K,WU P,YANG S.GPU and CPU cooperation parallel visualisation for large seismic data[J].Electronics Letters, 2010,46(17):1196-1197.DOI:10.1049/el.2010.1242. [9] LEE J,YI F,SAIFULLAH R,et al.Graphics processing unit-accelerated double random phase encoding for fast image encryption[J].Optical Engineering,2014,53(11):112308.DOI:10.1117/1.OE.53.11.112308. [10]LUO Yuling,ZHOU Ronglong,LIU Junxiu,et al.An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers[J].Multimedia Tools and Applications,2018,77(20):26191-26217.DOI: 10.1007/s11042-018-5844-5. [11]LUO Yuling,ZHOU Ronglong,LIU Junxiu,et al.A novel image encryption scheme based on Kepler’s third law and random Hadamard transform[J].Chinese Physics B,2017,26(12):120504.DOI:10.1088/1674-1056/26/12/120504. [12]SAIKUMAR N,KRISHNAN R B,MEGANATHAN S,et al.An encryption approach for security enhancement in images using key based partitioning technique[C]//2016 International Conference on Circuit,Power and Computing Technologies.Piscataway,NJ:IEEE Press,2016:1-4.DOI:10.1109/ICCPCT.2016.7530327. [13]ZHOU Guomin,ZHANG Daxing,LIU Yanjian,et al.A novel image encryption algorithm based on chaos and Line map[J].Neurocomputing,2015,169:150-157.DOI:10.1016/j.neucom.2014.11.095. [14]WANG Xingyuan,WANG Qian.A fast image encryption algorithm based on only blocks in cipher text[J].Chinese Physics B,2014,23(3):030503.DOI:10.1088/1674-1056/23/3/030503. [15]WANG Xingyuan,ZHAO Jianfeng,LIU Hongjun.A new image encryption algorithm based on chaos[J].Optics Communications,2012,285(5):562-566.DOI:10.1016/j.optcom.2011.10.098. [16]WU Jiahui,LIAO Xiaofeng,YANG Bo.Color image encryption based on chaotic systems and elliptic curve ElGamal scheme[J].Signal Processing,2017,141:109-124.DOI:10.1016/j.sigpro.2017.04.006. |
[1] | XIU Guilin, ZHANG Bowei, LIU Fan, LUO Ao. Server Trusted Framework Based on Trusted CPU Chip [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 43-50. |
[2] | YU Chunqiang , FU Rui , CHEN Yan , LEI Yun , ZHANG Xianquan , WANG Xiaoyun. Protecting Method of Regions of Interest of ImageBased on Information Hiding [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(2): 67-73. |
[3] | SHEN Li-na, JIANG Zhong-cheng, YIN Hui, QIN Xing-ming, LUO Wei-qun. Karst Ecological Environmental System Security Assessment of Guohua Rocky Desertification Area [J]. Journal of Guangxi Normal University(Natural Science Edition), 2014, 32(3): 141-149. |
[4] | QIN Zhang-rong, ZHANG Chao-ying, QIU Bin, LI Yuan-yuan, MO Liu-liu. Implementation of the Acceleration Simulation with Lattice Boltzmann Method Based on CUDA [J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(4): 18-24. |
|