<listing id="l9bhj"><var id="l9bhj"></var></listing>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<var id="l9bhj"></var><cite id="l9bhj"><video id="l9bhj"></video></cite>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"><listing id="l9bhj"></listing></strike></cite><cite id="l9bhj"><span id="l9bhj"><menuitem id="l9bhj"></menuitem></span></cite>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<ins id="l9bhj"><span id="l9bhj"></span></ins>
Volume 29 Issue 1
Aug.  2021
Turn off MathJax
Article Contents
ZANG Hongyan, MIN Lequan, WU Chunxue, ZHAO Geng. An image encryption scheme based on generalized synchronization theorem for discrete chaos system[J]. Chinese Journal of Engineering, 2007, 29(1): 96-101. doi: 10.13374/j.issn1001-053x.2007.01.021
Citation: ZANG Hongyan, MIN Lequan, WU Chunxue, ZHAO Geng. An image encryption scheme based on generalized synchronization theorem for discrete chaos system[J]. Chinese Journal of Engineering, 2007, 29(1): 96-101. doi: 10.13374/j.issn1001-053x.2007.01.021

An image encryption scheme based on generalized synchronization theorem for discrete chaos system

doi: 10.13374/j.issn1001-053x.2007.01.021
  • Received Date: 2006-09-05
  • Rev Recd Date: 2006-10-27
  • Available Online: 2021-08-16
  • A constructive theorem of generalized synchronization for discrete chaos systems is established. Based on the theorem, a generalized chaotic synchronization discrete system was constructed. Combining this system with the Henon chaotic mapping designs a digital image encryption scheme, which can successfully encrypt and decrypt gray-scale images without any lost. The scheme is sensitive to perturbations of the parameters and initial conditions of the chaos system. Any perturbations which are larger than 10-15 will make corresponding decryptions become impossible. The key space of the scheme is as large as 1076. The analysis of key space and key parameter sensitivity shows that the scheme has sound security. Numerical simulations reveal that the scheme is effective in network communication.

     

  • loading
  • 加載中

Catalog

    通訊作者: 陳斌, bchen63@163.com
    • 1. 

      沈陽化工大學材料科學與工程學院 沈陽 110142

    1. 本站搜索
    2. 百度學術搜索
    3. 萬方數據庫搜索
    4. CNKI搜索
    Article views (185) PDF downloads(7) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return
    久色视频