咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Fractal sorting vector-based l... 收藏

Fractal sorting vector-based least significant bit chaotic permutation for image encryption

Fractal sorting vector-based least significant bit chaotic permutation for image encryption

作     者:Yong-Jin Xian Xing-Yuan Wang Ying-Qian Zhang Xiao-Yu Wang Xiao-Hui Du 咸永锦;王兴元;张盈谦;王晓雨;杜晓慧

作者机构:School of Information Science and TechnologyDalian Maritime UniversityDalian 116026China School of Information Science and TechnologyXiamen University Tan Kah Kee CollegeZhangzhou 363105China 

出 版 物:《Chinese Physics B》 (中国物理B(英文版))

年 卷 期:2021年第30卷第6期

页      面:226-235页

核心收录:

学科分类:07[理学] 0839[工学-网络空间安全] 08[工学] 070201[理学-理论物理] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 0702[理学-物理学] 

基  金:supported by the National Natural Science Foundation of China (Grant No. 61672124) the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund,China (Grant No. MMJJ20170203) the Liaoning Provincial Science and Technology Innovation Leading Talents Program Project,China (Grant No. XLYC1802013) the Key Research and Development Projects of Liaoning Province,China (Grant No. 2019020105-JH2/103) the Jinan City 20-University Funding Projects for Introducing Innovation Team Program,China (Grant No. 2019GXRC031) 

主  题:chaotic image encryption fractal sorting vector bit-level permutation FSV-based LSB chaotic permutation 

摘      要:The image s least significant bit(LSB) covers lots of the details that have been commonly used in image encryption analysis. The newly proposed fractal sorting vector(FSV) and FSV-based LSB chaotic permutation(FSV-LSBCP) is a novel chaotic image encryption cryptosystem introduced in this article. The FSV-LSBCP effectively strengthens the security of the cryptographic scheme concerning the properties of the FSV. Key analysis, statistical analysis, resistance differential attack analysis, and resistance to cropping attacks and noise attacks are the focus of the suggested image encryption cryptosystem. The security experiment shows that the cryptosystem is adequate to achieve the desired degree of security.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分