Enhancement of Video Encryption Algorithm Performance Using Finite Field Z2^3-Based Chaotic Cipher
Enhancement of Video Encryption Algorithm Performance Using Finite Field Z2^3-Based Chaotic Cipher
出处
《通讯和计算机(中英文版)》
2012年第8期960-964,共5页
Journal of Communication and Computer
二级参考文献10
-
1Tang L.. Methods for encrypting an decrypting mpeg video data efficiently. In: Proceedings of ACM Multimedia'96, Boston United States, 1996, 219~229
-
2Shi C.,Bhargava B.. An efficient MPEG video encryption algorithm. In: Proceedings of the 6th ACM International Multimedia Conference, Bristol, United Kingdom, 1998, 9: 381~386
-
3Alattar A.M., Al-Regib G.I.. Improved selective encryption techniques for secure transmission of MPEG video bit-streams. In: Proceeding of ICIP, 1999, 4: 256~260
-
4Wu Xiao-Ling, Moo Peter W.. Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficient. In: Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 1999, 2: 908~912
-
5Romeo, Romolotti G., Mattavelli M., Mlynek D.. Cryptosystem architectures for very high throughput multimedia encryption: The RPK solution. In: Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems, Pafos, Cyprus, 1999, 261~264
-
6Silva C.P.,Young A.M.. Introduction to chaos-based communications and signal processing. IEEE Proceedings of Aerospace, 2000, 1: 279~299
-
7Robert Matthews. On the derivation of a "chaotic" encryption algorithm.Cryptologia. 1989, 8(1):29~41
-
8Wheeler D.D., Matthews R.A.J. Supercomputer investigations of a chaotic encryption algorithm. Cryptologia, 1991, 15(2): 140~152
-
9钟玉琢 乔秉新 祁卫.[D].北京:清华大学,1997.
-
10Bruce.Schneier.Applied Cryptography Protocols,Algorithms, and Source Code in C. America: Wiley & Sons Inc, 1996
共引文献41
-
1王艳芬,林土胜.一种混沌序列产生及加密方法[J].广西师范大学学报(自然科学版),2005,23(1):76-79. 被引量:3
-
2林巍峣,方向忠,黄修超.基于H.264的新型视频加密算法[J].信息安全与通信保密,2005,27(9):89-94. 被引量:5
-
3王亚伟,王行愚.一种结合Cat和Logistic映射的混沌加密算法[J].东南大学学报(自然科学版),2005,35(A02):128-131. 被引量:5
-
4司文,刘峰,张宁.混沌参数可变序列的流媒体加密算法[J].铁路计算机应用,2006,15(2):5-8.
-
5高昊江,张宜生,梁书云,李德群.一种新的混沌加密算法及其应用[J].小型微型计算机系统,2006,27(4):655-657. 被引量:12
-
6郜社荣,赵东风,丁洪伟.基于混沌序列的视频流部分加密[J].云南大学学报(自然科学版),2006,28(3):211-215. 被引量:4
-
7张萌,王繁珍,刘忠信,孙青林,陈增强,袁著祉.基于Baker映射的视频流加密算法(英文)[J].中国图象图形学报,2006,11(9):1327-1333. 被引量:2
-
8丁文霞,卢焕章,谢剑斌.混沌二值序列对异或运算构成群的理论和实验证明[J].系统工程与电子技术,2006,28(9):1420-1422. 被引量:5
-
9成亚萍,傅德胜,王新.基于合成混沌序列的图像加密算法[J].计算机应用与软件,2006,23(12):102-103. 被引量:3
-
10杨志云,陈琳,李伟,徐正全.利用随机数序列加密视频变长码字的新方法[J].华中科技大学学报(自然科学版),2007,35(3):8-11. 被引量:3
-
1YIN RuMing,WANG Jian,YUAN Jian,SHAN XiuMing,WANG XiQin.Weak key analysis for chaotic cipher based on randomness properties[J].Science China(Information Sciences),2012,55(5):1162-1171. 被引量:3
-
2Bo YANG,Xiaofeng LIAO.Period analysis of the Logistic map for the finite field[J].Science China(Information Sciences),2017,60(2):45-59. 被引量:3
-
3赵耿,方锦清.混沌密码机在保密通信中的应用研究[J].中国原子能科学研究院年报,2004(1):147-147. 被引量:1
-
4PEI Shihui ZHAO Hongwei ZHAO Yongzhe.Public Key Cryptography Based on Ergodic Matrices over Finite Field[J].Wuhan University Journal of Natural Sciences,2006,11(6):1525-1528. 被引量:8
-
5钟宁,匡镜明,何遵文.New Optimal DWT Domain Image Watermarking Technique via Genetic Algorithm[J].Journal of Beijing Institute of Technology,2007,16(4):465-470.
-
6GU Chunsheng,JING Zhengjun,YU Zhiming.Polynomial Time Algorithm for the Two-Side Exponentiation Problem about Ergodic Matrices over Finite Field[J].Wuhan University Journal of Natural Sciences,2012,17(3):233-237.
-
7刘正君,刘树田.基于反对易关系的图像加密编码方案[J].红外与激光工程,2006,35(z4):64-67. 被引量:1
-
8孙琦.The least positive integer represented by sum from i=1 to n x_i/d_i (1≤x_i≤d_i-1)[J].Chinese Science Bulletin,1996,41(6):447-450.
-
9戴宗铎.POLYNOMIAL REPRESENTATION OF A CLASS OF SEQUENCES[J].Chinese Science Bulletin,1987,32(10):649-654.
-
10ZHAO Jing,YUAN Jian-xin,NAN Ji-zhu.The Construction of Symplectic Involutions Over Finite Field with CharF=2 and Its Applications[J].Chinese Quarterly Journal of Mathematics,2009,24(2):173-184.