咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >A secure image protection algo... 收藏

A secure image protection algorithm by steganography and encryption using the 2D-TSCC

A secure image protection algorithm by steganography and encryption using the 2D-TSCC

作     者:李琦 王兴元 王赫 叶晓林 周双 高锁 施云庆 Qi Li;Xingyuan Wang;He Wang;Xiaolin Ye;Shuang Zhou;Suo Gao;Yunqing Shi

作者机构:School of Information Science and TechnologyDalian Maritime UniversityDalian 116026China Guangxi Key Laboratory of Multi-source Information Mining&SecurityGuangxi Normal UniversityGuilin 541004China Dalian Hongwen Middle SchoolDalian 116000China School of Mathematical SciencesChongqing Normal UniversityChongqing 401331China Department of Electrical and Computer EngineeringNew Jersey Institute of TechnologyNewark NJ 07102USA 

出 版 物:《Chinese Physics B》 (中国物理B(英文版))

年 卷 期:2021年第30卷第11期

页      面:274-285页

核心收录:

学科分类:08[工学] 0839[工学-网络空间安全] 081201[工学-计算机系统结构] 0702[理学-物理学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:Project supported by the National Natural Science Foundation of China (Grant No. 61672124) the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (Grant No. MMJJ20170203) Liaoning Provincial Science and Technology Innovation Leading Talents Program Project,China (Grant No. XLYC1802013) Key Research and Development Projects of Liaoning Province,China (Grant No. 2019020105-JH2/103) Jinan City ‘20 Universities’ Funding Projects Introducing Innovation Team Program (Grant No. 2019GXRC031) Guangxi Key Laboratory of Multi-source Information Mining&Security (Grant No. MIMS20-M-02) 

主  题:2D-TSCC steganography image encryption mod diffuse chaos 

摘      要:Based on the two-dimensional(2D)tan-sin-cos-coupling(2D-TSCC),a new image protection method is designed,this method includes steganography and ***,a 2D-TSCC system is *** 2D-TSCC has a large parameter space in a hyperchaotic *** chaotic trajectory fills the entire *** chaotic sequence generated by the 2D-TSCC has a good pseudorandomness,so it can be used in steganography and ***,the amount of information contained in each bit of the cover image is analyzed,and the three bits which carry the least amount of information are *** secret image is hidden in these three bits base on the ***,the carrier image is scrambled and diffused by the *** ciphertext is generated in this *** the ciphertext to the recipient through channel transmission,and the recipient obtains the secret image by decrypting twice.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分