<listing id="l9bhj"><var id="l9bhj"></var></listing>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<var id="l9bhj"></var><cite id="l9bhj"><video id="l9bhj"></video></cite>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"><listing id="l9bhj"></listing></strike></cite><cite id="l9bhj"><span id="l9bhj"><menuitem id="l9bhj"></menuitem></span></cite>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<ins id="l9bhj"><span id="l9bhj"></span></ins>
Volume 27 Issue 6
Aug.  2021
Turn off MathJax
Article Contents
ZHANG Xiaohong, MIN Lequan. Non-symmetric digital image encryption scheme based on a generalized chaos synchronization system[J]. Chinese Journal of Engineering, 2005, 27(6): 754-759. doi: 10.13374/j.issn1001-053x.2005.06.028
Citation: ZHANG Xiaohong, MIN Lequan. Non-symmetric digital image encryption scheme based on a generalized chaos synchronization system[J]. Chinese Journal of Engineering, 2005, 27(6): 754-759. doi: 10.13374/j.issn1001-053x.2005.06.028

Non-symmetric digital image encryption scheme based on a generalized chaos synchronization system

doi: 10.13374/j.issn1001-053x.2005.06.028
  • Received Date: 2005-04-08
  • Rev Recd Date: 2005-06-18
  • Available Online: 2021-08-17
  • Based on a generalized chaos synchronization (GCS) system and a generalized Sinai map, a non-symmetric digital cryptographic scheme was proposed. The scheme could hide, in conventional sound signals, various kinds of formatted images which a computer can recognize, realizing information disguise and hiding. This scheme with 24 keys could recover hidden images without any errors. The key space of the scheme was as large as 10360. The scheme had data origin authentication function. Even if a receiver could not communicate with the sender of encrypted data, the receiver can still conftrm whether the data are altered by an intruder. The scheme could be applied in the internet image transmissions disguised via sound signals. The analysis of the key space, the sensitivity of key parameters and the correlation of encrypted signals implied that this scheme had good security.

     

  • loading
  • 加載中

Catalog

    通訊作者: 陳斌, bchen63@163.com
    • 1. 

      沈陽化工大學材料科學與工程學院 沈陽 110142

    1. 本站搜索
    2. 百度學術搜索
    3. 萬方數據庫搜索
    4. CNKI搜索
    Article views (184) PDF downloads(5) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return
    久色视频