期刊文献+

一种新的基于混沌映射的密钥分享的叠像术

A new image covering of secret sharing based on chaotic map
下载PDF
导出
摘要 随着计算机网络的普及和应用,信息安全问题已经成为迫切解决的问题。传统的加密和信息隐藏已不能满足现代通信的需要。该文提出了一种新的基于混沌映射和密钥分享的叠像术,使得信息在网络上的传输更具有安全性。 More and more information question along with the internet,have become imperious question the traditional secrete and information hiding has not satisfy with the modern communication need.In this paper,it gives a new method for image covering of secret sharing based on chaotic map.This method makes the information is more safety.
作者 李颖 蔡翔云
出处 《计算机安全》 2008年第11期26-27,33,共3页 Network & Computer Security
关键词 混沌映射 密钥分享 叠像术 子密钥 主密钥 Chaotic map secret sharing image covering subkey key
  • 相关文献

参考文献3

二级参考文献26

  • 1单华宁,王执铨,王国清,李艳芳,王滨,尹政.一种基于小波变换的混沌图像加密方法[J].计算机应用,2003,23(z1):199-201. 被引量:12
  • 2Yen Juicheng.Watermarks Embedded in the Permuted Image.Electronics Letters,2001,37: 80-81
  • 3Feng Guorui,Jiang Lingge,He Chen,et al.A Novel Algorithm for Embedding and Detecting Digital Watermarks.Acoustics,Speech and Signal Processing 2003 Proceedings,ICASSP'03,2003,3: 549-552
  • 4Fridrich J.Symmetric Ciphers Based on Two-dimensional Chaotic Maps.International Journal of Bifurcation and Chaos,1998,8(6): 1259-1284
  • 5Kohda T,Tsuneda A.Statistics of Chaotic Binary Sequences.IEEE Trans.Information Theory,1997,3: 104-112
  • 6Tao Yang,Lin-Bao Yang, Chun-Mei Yang. Application of neural networks to unmasking chaotic secure communication[J]. Phys. D, 1998;124:248-257.
  • 7H Dedieu, M J Ogorzalek. Indentifiability and identification of chaotic systems based on adaptive synchronization.IEEE Trans on Circuits and Systems-I: 1997, 44 (10).
  • 8Scharinger J. Fast encryption of image data using chaotic Kolmogorov flows [A] . Proceeding of the International Society for Optical Engineering[C],San Jose, California,1997, 3022:278 - 289.
  • 9Boccaletti S, Grebogi C, Lai Y- C, et al. The control of chaos: theory and applications [J] . Physics report, 2000,329:103 - 197.
  • 10R. Matthews. On the derivation of a chaotic encryption algorithm[J]. Cryptogia,1989; 13:29-42.

共引文献53

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部