登录
首页 » matlab » lorentz

lorentz

于 2010-05-21 发布 文件大小:4565KB
0 147
下载积分: 1 下载次数: 116

代码说明:

  文字图像,通过混沌加密,利用洛伦兹变换,即三维空间加密程序(Text images, through encryption, using the Lorentz transformation, ie three-dimensional encryption program)

文件列表:

aa.txt,157,2009-11-09
backward.m,1531,2009-11-09
forward.m,1443,2009-11-09
加密后的密文.txt,308,2009-11-09
加密图像.emf,1479196,2009-11-09
图像裁剪一块后解码明文.txt,166,2009-11-09
密文嵌入图像中.emf,1479216,2009-11-09
裁剪一块后图像.emf,1478508,2009-11-09
裁剪一块后解密图像.emf,1479196,2009-11-09
解密图像.emf,1479196,2009-11-09

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • This is the document prepared by C combined with the partition of the source cod...
    这是用C编写的文件合并与分割的源代码,还请各位指教。-This is the document prepared by C combined with the partition of the source code, also called upon to advise.
    2022-04-10 13:08:48下载
    积分:1
  • mimi
    图像加密与密写技术,很强悍的!现在很需要这种东西的哦(密写哦!!!!!!)
    2009-06-05 11:37:21下载
    积分:1
  • MD5算法的java实现
    MD5算法的java实现-The implement of MD5 algorithm for JAVA
    2023-04-30 10:30:02下载
    积分:1
  • AES编码/
    AES encoding/decoding
    2023-08-02 18:00:03下载
    积分:1
  • 本文介绍了在JAVA环境下如何实现IDEA对称算法。由于电子商务和电子政务的普及,安全技术在其中应用非常广泛,对安全技术的要求也很高。目前在JAVA...
    本文介绍了在JAVA环境下如何实现IDEA对称加密算法。由于电子商务和电子政务的普及,安全加密技术在其中应用非常广泛,对安全加密技术的要求也很高。目前在JAVA环境下实现IDEA加密具有很多的优势,因为JAVA是基于面向对象的编程语言,并且由于它的平台无关性能被大量应用于Internet的开发。-This paper presents the Java environment IDEA how to achieve symmetric encryption algorithm. As e-commerce and e-government popular, security encryption technology, which is widely used for security encryption technology requirements is also high. In Java environment under IDEA encryption has many advantages, because Java is based on object-oriented programming language, and because it is platform independent performance was widely used in Internet development.
    2022-05-08 18:12:15下载
    积分:1
  • 123
    首先对字母进行编号,小写字母a至z编号为1至26,大写字母A至Z分别编号27至52,这样每个字母都有唯一的一个序号,在发送内容时,我们以函数F(X)=X*X+X+1对发送字母的序号进行计算,就会获取个新的序号,对该序号再进行对52取余,该序号即为加密后的要发送字母的序号,这样就能达到加密的作用。(Number first letter lowercase letters a to z No. 1-26, No. 27-52 uppercase letters A to Z, respectively, so each letter has a unique serial number, sending content to the function F (X- ) = X* X+X+1 send letters number is calculated, it will get a new serial number, the serial number and then take the remainder of the 52, the serial number is the serial number of the letters to be sent encrypted, so that we can achieve encryption role.)
    2012-10-14 22:07:45下载
    积分:1
  • AES算法的实现
    AES encryption algorithm implementation
    2022-12-03 09:35:02下载
    积分:1
  • C_MD5 是一个用C写的标准MD5算法,使用简单,快速
    C_MD5 是一个用C写的标准MD5加密算法,使用简单,快速
    2022-11-25 13:50:03下载
    积分:1
  • A algorithm base on DES
    基于DES加密算法-A algorithm base on DES
    2023-08-02 08:30:03下载
    积分:1
  • Windows 2000
    Windows 2000-XPWinice.zip,加密解密方方面-Windows 2000-XPWinice.zip, encryption and decryption side aspects
    2022-03-07 18:32:30下载
    积分:1
  • 696518资源总数
  • 105559会员总数
  • 1今日下载