登录
首页 » 加密解密 » ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...

ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map...

于 2022-05-30 发布 文件大小:1.05 MB
0 193
下载积分: 2 下载次数: 1

代码说明:

ieee一种基于混沌的新加密方法An Image Encryption Scheme Based on Chaotic Map - In this paper, a novel block digital image encryp- tion scheme based on a chaotic coupled map lattices (CML) is reported. Within this scheme, an original image is decomposed into sub-blocks with a given size, and an external secret key with 192-bit is used and mapped to the system parameters, which are employed to generate a spatiotemporal chaotic binary sequence matrix to encrypt the block original image. Besides, the former sub-block encrypted result will be acted as a feedback to the following sub-block encryption proc- ess. The proposed scheme is described in detail, along with the security analyses such as key space analysis, sensitivity analysis, information entropy analysis and correlation coefficients analysis of adjacent pixels. The computer simulation results indicate that the suggested image encryption scheme has some properties desir- able in a good security

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 采用对称的3DES算法经典程序源码
    采用对称密钥加密的3DES算法经典程序源码-using symmetric key encryption algorithms 3DES classic procedures FOSS
    2022-08-24 01:26:54下载
    积分:1
  • base64.pas
    单位基数64;
    2022-04-20 23:11:00下载
    积分:1
  • rc5
    rc5-cts 模式的实现源码,与RFC中的实有所不同-RC5- ctc-source model of achievement, and the RFC is different
    2022-04-06 11:43:12下载
    积分:1
  • MD5单元及DEMO
    MD5加密单元及DEMO-MD5 encryption modules and DEMO
    2023-06-06 08:25:03下载
    积分:1
  • DES(Data Encrypton Standard) 算法的实现网上已经有很多,本人在此讲述的是在DES算法过程中如何查看16迭代过程中生成的Ki,Li...
    DES(Data Encrypton Standard) 算法的实现网上已经有很多,本人在此讲述的是在DES算法加密过程中如何查看16迭代过程中生成的Ki,Li,Ri,Fi,Si等,这样可以当做一个DES加密对照器,这样可以方便的发现你在加密过程中出现的错误! -DES (Data Encrypton Standard) algorithm has been achieved online many, I would like to speak on is the DES encryption algorithm to see how the process 16 iterative process of generating Ki, Li, Ri, Fi, Si, etc., can serve as a control device DES encryption, this can easily find you in the process of encryption the mistakes!
    2022-02-03 17:27:13下载
    积分:1
  • 差分码分析,此实验是对S
    差分密码分析,此实验是对S-P密码体制的差分分析-differential cryptanalysis, the experiment of S-P Cryptosystem Differential Analysis
    2022-07-20 18:23:49下载
    积分:1
  • An improved tabu search algorithm to solve knapsack problem. The algorithm is ba...
     提出一种改进的禁忌搜索算法来求解背包问题。该算法基于禁忌搜索技术,并采用I&D策略,同时设计了两种针对局 部最优解的变异算子。改进后的算法能有效地弥补标准禁忌算法对初始解依赖的缺陷,同时也避免了搜索停滞的现象。通过对具 体实例和随机问题的测试,表明改进后的禁忌搜索算法有更好的性能。 关-An improved tabu search algorithm to solve knapsack problem. The algorithm is based on tabu search techniques, using I & D strategies, while designed for the local optimal solution of the two kinds of mutation operator. The improved algorithm can effectively compensate for the standard tabu search algorithm depends on the initial solution defect, but also to avoid the phenomenon of search stagnation. Through specific examples and random-question test, indicating that the improved tabu search algorithm has better performance. Guan
    2022-01-31 13:51:44下载
    积分:1
  • 根据自己的要求可以修改,MD5处理单元。
    根据自己的加密要求可以修改,MD5加密处理单元。-According to their own requirements can be amended encryption, MD5 encryption processing unit.
    2023-02-26 09:00:04下载
    积分:1
  • implementation of rijndael furious algorithm to encrypt and decrypt information
    implementation of rijndael furious algorithm to encrypt and decrypt information
    2022-07-18 19:30:46下载
    积分:1
  • des数据算法原理与实现。
    des数据加密算法原理与实现。-des Data Encryption Algorithm Theory and Implementation.
    2022-05-28 18:15:06下载
    积分:1
  • 696516资源总数
  • 106436会员总数
  • 7今日下载