[1]
|
搜狐网. 近百国遭黑客攻击罪魁祸首是一个名为“想哭”勒索软件[EB/OL].
http://www.sohu.com/a/140477115_116897, 2017-07-13.
|
[2]
|
搜狐网. 数字时代的网络安全, 美国才是最大的网络入侵者[EB/OL].
http://www.sohu.com/a/148864577_550962, 2017-07-13.
|
[3]
|
王静. 混沌数字图像加密技术研究[D]. 南京: 南京邮电大学, 2013.
|
[4]
|
李昌刚, 韩正之, 张浩然. 一种基于随机密钥及“类标准映射”的图像加密算法[J]. 计算机学报, 2003, 26(4): 465-470.
|
[5]
|
张同锋. 基于一维复合混沌映射的数字图像加密算法研究[D]: [博士学位论文]. 兰州: 兰州大学, 2016.
|
[6]
|
Liu, W., Sun, K. and Zhu, C. (2016) A Fast Image Encryption Algorithm Based on Chaotic Map. Optics and Lasers in Engineering, 84, 26-36. https://doi.org/10.1016/j.optlaseng.2016.03.019
|
[7]
|
张强, 田小平. 基于图像位平面分解的混沌加密方法研究[J]. 西安邮电学院学报, 2010, 15(5): 83-86.
|
[8]
|
Robinson, R.C., 韩茂安, 邢业朋, 等. 动力系统导论[M]. 北京: 机械工业出版社, 2007.
|
[9]
|
Alvarez, G. and Li, S. (2006) Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. International Journal of Bifurcation and Chaos, 16, 2129-2151. https://doi.org/10.1142/S0218127406015970
|
[10]
|
Matthews, R. (1989) On the Derivation of a “Chaotic” Encryption Algorithm. Cryptologia, 13, 29-42.
https://doi.org/10.1080/0161-118991863745
|
[11]
|
Fridrich, J. (1998) Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. International Journal of Bifurcation and Chaos, 8, 1259-1284. https://doi.org/10.1142/S021812749800098X
|
[12]
|
Ye, G. and Huang, X. (2017) An Efficient Symmetric Image Encryption Algorithm Based on an Intertwining Logistic Map. Neurocomputing, 251, 45-53.
|
[13]
|
Hua, Z., Zhou, Y., Pun, C.M., et al. (2015) 2D Sine Logistic Modulation Map for Image Encryption. Information Sciences, 297, 80-94.
|
[14]
|
Wang, X. and Zhang, H. (2015) A Color Image Encryption with Heterogeneous Bit-Permutation and Correlated Chaos. Optics Communications, 342, 51-60.
|
[15]
|
Xi, Y., Zhang, X. and Ye, R. (2016) Color Image Encryption Based on Multiple Chaotic Systems. International Journal of Network Security & Its Applications, 8, 39-50.
|
[16]
|
Niyat, A.Y., Moattar, M.H. and Torshiz, M.N. (2017) Color Image Encryption Based on Hybrid Hyperchaotic System and Cellular Automata. Optics and Lasers in Engineering, 90, 225-237.
|
[17]
|
Yao, L., Yuan, C., Qiang, J., et al. (2017) An Asymmetric Color Image Encryption Method by using Deduced Gyrator Transform. Optics and Lasers in Engineering, 89, 72-79.
|
[18]
|
Kadir, A., Aili, M. and Sattar, M. (2017) Color Image Encryption Scheme using Coupled Hyper Chaotic System with Multiple Impulse Injections. Optik-International Journal for Light and Electron Optics, 129, 231-238.
|
[19]
|
Pak, C. and Huang, L. (2017) A New Color Image Encryption using Combination of the 1D Chaotic Map. Signal Processing, 138, 129-137.
|
[20]
|
Patidar, V., Pareek, N.K., Purohit, G., et al. (2011) A Robust and Secure Chaotic Standard Map Based Pseudorandom Permutation-Substitution Scheme for Image Encryption. Optics Communications, 284, 4331-4339.
|
[21]
|
Ye, R. and Huang, H. (2010) Application of the Chaotic Ergodicity of Standard Map in Image Encryption and Watermarking. International Journal of Image, Graphics and Signal Processing, 2, 19.
https://doi.org/10.5815/ijigsp.2010.01.03
|
[22]
|
Zhao, J., Guo, W. and Ye, R. (2014) A Chaos-Based Image Encryption Scheme using Permutation Substitution Architecture. International Journal of Computer Trends and Technology, 15, 174-185.
https://doi.org/10.14445/22312803/IJCTT-V15P137
|
[23]
|
The USC-SIPI Image Database (2017).
http://sipi.usc.edu/database/
|
[24]
|
张弘. 数字图像处理与分析[M]. 北京: 机械工业出版社, 2013.
|
[25]
|
Laiphrakpam, D.S. and Khumanthem, M.S. (2017) Cryptanalysis of Symmetric Key Image Encryption using Chaotic Rossler System. Optik-International Journal for Light and Electron Optics, 135, 200-209.
|