登录
首页 » TEXT » chipher

chipher

于 2015-07-31 发布 文件大小:817KB
0 227
下载积分: 1 下载次数: 19

代码说明:

  :目前混沌系统与加密技术相结合是现如今最热门的一个课题,虽然有大量的加密算法面世,但是这些加密算法并不成熟,仍然需要进一步的研究。本文采用像素位置置乱变换和像素值替代变换相结合的加密思想,设计出一种基于混沌的数字图像加密算法。引入了整数域上的逆仿射变换,算法中采用二维 logistic 混沌映射相结合的方法,生成多组混沌序列,像素置乱变换与灰度值替换都由这些混沌序列所控制。多混沌序列产生的密钥空间大于单一的混沌序列所产生的密钥空间,因此本文研究的算法加密强度很高。(The current chaotic system with encryption technology combined is now one of the hottest topics, although there are a number of encryption algorithms available, but these encryption algorithms are not ripe, still need further study. In this paper, the pixel position and the pixel value Scrambling alternative encryption ideological transformation combining design a digital image based on chaos encryption algorithm. The introduction of the inverse affine transformation integer domain, the algorithm uses a two-dimensional logistic chaos mapping method of combining to produce multiple sets of chaotic sequence, scrambling transformation and pixel gray values are replaced by the chaotic sequence control. Key space more chaotic sequence is greater than the key space of a single chaotic sequence generated by the algorithm to encrypt and therefore high strength paper.)

文件列表:

新建文件夹

..........\getNum.m,299,2015-07-31
..........\Language - 副本.m,804,2015-07-31
..........\Language.m,804,2015-07-31
..........\lock_logistic_gray.asv,534,2015-07-31
..........\lock_logistic_gray.m,535,2015-07-31
..........\Untitled.asv,215,2015-07-31
..........\Untitled.m,215,2015-07-31
..........\基于USBKey的数据源到云端保护方案_刘明达.pdf,214446,2015-07-30
..........\基于参数自适应控制的分数阶离散logistic映射同步_胡声丹_王艺红.pdf,801201,2015-07-31

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • Data encryption algorithm, a very good Dongdong, a try to know.
    数据加密算法,很好的东东,下了试试看就知道了。-Data encryption algorithm, a very good Dongdong, a try to know.
    2023-01-12 07:25:04下载
    积分:1
  • 本文介绍了在JAVA环境下如何实现IDEA对称算法。由于电子商务和电子政务的普及,安全技术在其中应用非常广泛,对安全技术的要求也很高。目前在JAVA...
    本文介绍了在JAVA环境下如何实现IDEA对称加密算法。由于电子商务和电子政务的普及,安全加密技术在其中应用非常广泛,对安全加密技术的要求也很高。目前在JAVA环境下实现IDEA加密具有很多的优势,因为JAVA是基于面向对象的编程语言,并且由于它的平台无关性能被大量应用于Internet的开发。-This paper presents the Java environment IDEA how to achieve symmetric encryption algorithm. As e-commerce and e-government popular, security encryption technology, which is widely used for security encryption technology requirements is also high. In Java environment under IDEA encryption has many advantages, because Java is based on object-oriented programming language, and because it is platform independent performance was widely used in Internet development.
    2022-05-08 18:12:15下载
    积分:1
  • GOST算法
    GOST加密算法-GOST encryption algorithm
    2022-02-05 20:46:16下载
    积分:1
  • 老外写的库cryptlib(版本3.1)
    老外写的加密库cryptlib(版本3.1)-foreigner to write encryption for cryptlib (version 3.1)
    2022-07-03 06:20:10下载
    积分:1
  • crypto dll 5.1 des 3des
    加密crypto dll 5.1 des 3des-Encryption crypto dll 5.1 des 3des
    2022-01-30 19:42:27下载
    积分:1
  • 3des-des
    世界著名的加密des 3des加密和解密验算工具,很好用,可用于计算机编程和嵌入式系统编程中。(World famous encryption des 3des encryption and decryption tool, useful, can be used for computer programming and embedded systems programming.)
    2016-02-16 18:07:45下载
    积分:1
  • 3dsmax-md5importer
    可以将md5格式的模型导入到3ds max中的一个插件(3dsmax-md5importer)
    2010-10-01 03:54:27下载
    积分:1
  • 分组码算法,可用于文件 该算法设计者是著名的华人码学家来学嘉教授...
    分组密码算法,可用于文件加密 该算法设计者是著名的华人密码学家来学嘉教授-Block cipher algorithm, can be used for file encryption algorithm designed by the famous Chinese cryptographer to Xuejia Professor
    2023-03-08 03:20:02下载
    积分:1
  • CSharpnumberjiami
    c#开发的数字加密,基本代码,可以实现。(Digital encryption c# development, the basic code. Can be achieved.)
    2014-12-13 22:36:49下载
    积分:1
  • tablecrypt是一个文件工具。
    TableCrypt is a file encryption utility. The major difference with most file encryptors is that this program uses a generated table in combination with a password to encrypt a file. This way you need 2 variables to decrypt the file. This is how it works: Generate a 10kb table file and enter a password. The password is used to pick bytes from the table file which in their turn are used to encrypt the bytes of the inputfile with XOR encryption.
    2022-06-18 03:20:49下载
    积分:1
  • 696518资源总数
  • 105885会员总数
  • 31今日下载